A Beginner’s Guide to Smartphone Security

6 years ago

Smartphone security is an incredibly important consideration for most people. While Apple has developed a reputation for security and Android…

6 Reasons You Should Buy A Budget Phone

6 years ago

There is an unfortunate misconception around the idea of budget devices. People think they are priced low because they cost…

KatroLogger : KeyLogger for Linux Systems

6 years ago

KatroLogger is a tool used for KeyLogger for Linux Systems. Features Runs on GUI systems or CLISending data by email…

Attacker-Group-Predictor : Tool To Predict Attacker Groups

6 years ago

Attacker-Group-Predictor is a tool predicts attacker groups from techniques and software used. It searches based on the MITRE ATT&CK™ framework.…

EvilPDF – Embedding Executable Files In PDF Documents

6 years ago

EvilPDF is a hiding executable files in PDF documents. Usage git clone https://github.com/thelinuxchoice/evilpdf cd evilpdf python -m pip install pypdf2…

Needle : Instant Access To You Bug Bounty Submission Dashboard On Various Platforms

6 years ago

Needle is the only chrome extension you may need to have one click access to your bug submissions across various…

Atlas : Quick SQLMap Tamper Suggester v1.0

6 years ago

Atlas is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned…

RMIScout : Bruteforce Attacks Against Exposed Java RMI Interfaces

6 years ago

RMIScout performs wordlist and bruteforce attacks against exposed Java RMI interfaces to safely guess method signatures without invocation. On misconfigured…

StegCloak : Hide Secrets With Invisible Characters In Plain Text Securely Using Passwords

6 years ago

StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside text by compressing and…

BabyShark : Basic C2 Server 2020

6 years ago

BabyShark is a basic C2 generic server written in Python and Flask. This code has based idea to GTRS, which…