How to Install Ubuntu On Windows 10?

6 years ago

In this article will provide you with step by step instruction on installation of Ubuntu on the Windows 10 operating…

Hostintel : A Modular Python App to Collect Intelligence for Malicious Hosts

6 years ago

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence…

UserLAnd : Run a Linux Distribution or Application on Android

6 years ago

The assets that UserLAnd depends on and the scripts that build them are contained in other repositories. The common assets…

IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices

6 years ago

IoT Home Guard is a project to help people discover malware in smart home devices. For users the project can…

Command Injection Payload List

6 years ago

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via…

RootOS – macOS Root Helper

6 years ago

rootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding…

Vuls : Vulnerability Scanner for Linux/FreeBSD, Agentless, Written in Go

6 years ago

Vuls is a vulnerability scanner for Linux/FreeBSD, agentless, written in golang. Also Read - Turbinia : Automation and Scaling of…

Kage – Graphical User Interface for Metasploit Meterpreter & Session Handler

6 years ago

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.For…

Chomp-Scan : A Scripted Pipeline of Tools To Streamline The Bug Bounty/Penetration Test Reconnaissance Phase

6 years ago

Chomp-Scan is a scripted pipeline of tools to simplify the bug bounty/penetration test reconnaissance phase, so you can focus on…

Reverse Shell Cheat Sheet 2019

6 years ago

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your…