Sherlock : Find Usernames Across Social Networks

5 years ago

Sherlock Project provides a very powerfull command line tool called Sherlock to find usernames across many social networks. It requires Python…

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

5 years ago

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An…

Spyse : Python API Wrapper & Command-Line Client For The Tools Hosted On Spyse.com

5 years ago

Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL /…

Windows Linux Kernel Is Now Available Via WSL 2

5 years ago

At the point when Microsoft first reported bash on Windows and brought Linux inside Windows as Windows Subsystem for Linux…

PTF : A Way For Modular Support For Up-To-Date Tools

5 years ago

PTF( PenTesters Framework) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for…

Scapy : Python-Based Interactive Packet Manipulation Program & Library

5 years ago

Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of…

Best Way to Learn Programming Online If You’re Tired of Books and Tutors

5 years ago

Today programming is taking the reins of the world's labor market. Ever developing, much promising and forward-looking, it's really worthwhile…

TwitterShadowBanV2 : Twitter Shadowban Tests

5 years ago

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy,…

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

5 years ago

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use…

Lynis : Security Auditing Tool for Unix/Linux Systems

5 years ago

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an…