SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’ Misconfigurations & Vulnerabilities Within Sudo

6 years ago

SUDO KILLER is a tool which help to abuse SUDO in different ways and with the main objective of performing…

Hvazard : Remove Short Passwords & Duplicates, Change Lowercase To Uppercase & Reverse, Combine Wordlists

6 years ago

HVAZARD dictionary modifier remove short passwords & duplicates, change lowercase to uppercase & reverse, combine wordlists! Manual & Explaination d…

GitGot – Semi-Automated, Feedback-Driven Tool To Rapidly Search Through Troves Of Public Data On GitHub For Sensitive Secrets

6 years ago

GitGot is a semi-automated, feedback-driven tool to empower users to rapidly search through troves of public data on GitHub for…

Git Hound – Find Exposed Keys Across GitHub Using Code Search Keywords

6 years ago

Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring…

A Closer Look At The Brushless DC Electric Motor

6 years ago

The brushless DC electric motor (also known as BL motor, BLDC motor or electronically commutated motor) is one of the…

Kali NetHunter App Store Dedicated to Free Security Apps

6 years ago

The Kali NetHunter App Store is an installable catalogue of Android applications for penetration testing and forensics. The client makes…

Userrecon PY : Recognition Usernames In 187 Social Networks

6 years ago

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have…

Explo : Human & Machine Readable Web Vulnerability Testing Format

6 years ago

Explo is a simple tool to describe web security issues in a human and machine readable format. By defining a…

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

6 years ago

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom…

Brute Force : BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

6 years ago

In this article we will see on how to BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix. First let us see…