Git Hound – Find Exposed Keys Across GitHub Using Code Search Keywords

5 years ago

Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring…

A Closer Look At The Brushless DC Electric Motor

5 years ago

The brushless DC electric motor (also known as BL motor, BLDC motor or electronically commutated motor) is one of the…

Kali NetHunter App Store Dedicated to Free Security Apps

5 years ago

The Kali NetHunter App Store is an installable catalogue of Android applications for penetration testing and forensics. The client makes…

Userrecon PY : Recognition Usernames In 187 Social Networks

5 years ago

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have…

Explo : Human & Machine Readable Web Vulnerability Testing Format

5 years ago

Explo is a simple tool to describe web security issues in a human and machine readable format. By defining a…

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

5 years ago

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom…

Brute Force : BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

5 years ago

In this article we will see on how to BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix. First let us see…

DIE : Program For Determining Types Of Files For Windows, Linux & MacOS

5 years ago

Detect It Easy, or abbreviated DIE is a program for determining types of files. It is a cross-platform application, apart…

Machinae : Machinae Security Intelligence Collector

5 years ago

Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data: IP addresses, domain names,…

Fake Sandbox : Script To Simulate Fake Processes Of Analysis Sandbox/VM

5 years ago

Fake Sandbox Processes small script will simulate fake processes of analysis, sandbox and VM software that some malware will try…