5 Tips to Protect Yourself from Cyberattacks at The University

5 years ago

Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as…

Top 3 Best Ways to Track Someone by Cell Phone Number

5 years ago

There are many people who know quite well how to track someone by cell phone number, but there are some…

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

5 years ago

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and…

Shell Backdoor List : PHP / ASP Shell Backdoor List

5 years ago

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to…

Hakrawler : Discovery Of Endpoints & Assets Within A Web Application

5 years ago

Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It…

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

5 years ago

GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions. This…

SWFPFinder : SWF Potential Parameters Finder

5 years ago

SWFPFinder is a simple and open source bash script designed to discovery the potential swf (file) parameters on the webapp…

LaravelN00b : Automated Scan .env Files & Checking Debug Mode In Victim Host

5 years ago

Incorrect configuration allows you to access .env files or reading env variables. LaravelN00b automated scan .env files and checking debug…

Andriller : Software Utility With A Collection Of Forensic Tools For Smartphones

5 years ago

Andriller is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from…

Lava : Large-scale Automated Vulnerability Addition

5 years ago

Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has…