Hmmcookies – Grab Cookies From Firefox, Chrome & Opera

5 years ago

Hmmcookies is a tool used to grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass UAC). Install git…

Business Secure: How AI is Sneaking into our Restaurants

5 years ago

Prior to pandemic days, the restaurant industry talked of computers that might end up taking over their daily responsibilities. They’d…

InQL : A Burp Extension For GraphQL Security Testing

5 years ago

InQL is a security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone…

Token Breaker : JSON RSA To HMAC & None Algorithm Vulnerability POC

5 years ago

Token Breaker is focused on 2 particular vulnerability related to JWT tokens. None AlgorithmRSAtoHMAC Refer to this link about insights…

Pythem – Penetration Testing Framework

5 years ago

Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and…

The Role of Digital Forensics in Solving Cyber Crimes

5 years ago

Your mobile app developers today have to understand more than simply putting together some code. They have to understand cybersecurity…

SAyHello – Capturing Audio (.Wav) From Target Using A Link

5 years ago

SAyHello is a tool used to capturing audio (.Wav) from target using a link. How it works? After the user…

Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems

5 years ago

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core…

Recon : Enumerate A Target Based Off Of Nmap Results

5 years ago

Recon enumerate a target based off Of Nmap results. Features The purpose of O.G. Auto-Recon is to automate the initial…

Why is Cyber Crime Starts Growing? Detailed Report

5 years ago

In the era of modern technologies when almost all the data about us is available online, the level of cyber…