AntiCheat : Framework To Test Any Anti-Cheat

5 years ago

AntiCheat is a framework to test any Anti-Cheat on the market. This can be used as Template or Code Base…

Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

5 years ago

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup…

Gowitness : A Golang Web Screenshot Utility Using Chrome Headless

5 years ago

Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using…

Lsassy : Extract Credentials From Lsass Remotel

5 years ago

Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary…

5 Tips to Protect Yourself from Cyberattacks at The University

5 years ago

Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as…

Top 3 Best Ways to Track Someone by Cell Phone Number

5 years ago

There are many people who know quite well how to track someone by cell phone number, but there are some…

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

5 years ago

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and…

Shell Backdoor List : PHP / ASP Shell Backdoor List

5 years ago

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to…

Hakrawler : Discovery Of Endpoints & Assets Within A Web Application

5 years ago

Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It…

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

5 years ago

GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions. This…