P-Gen

1 year ago

About Tool: The Python-based P-gen tool generates random passwords in a matter of milliseconds. This tool is compatible with both…

Cracking the User Credentials using the John the Ripper

1 year ago

I am going to demonstrate two ways in which we will crack the user credentials using John the Ripper. So,…

Top 5 popular Web Scanner for Kali Linux

1 year ago

Here are five well-known Web Scanner for Kali Linux, along with their brief descriptions, installation, and usage examples: Kali Linux…

007-TheBond

1 year ago

Information about the Script Finding information about your friends, family, enemies, and the crush who will not talk to you…

Sashay all in one Automatic Installer

1 year ago

Introduction In this article, we will see Sashay Installation. Sashay is an integrated automatic installer for practical Linux-based tools. More…

Denial of Service (DoS) Attack Using dSniff

1 year ago

A Denial-of-Service (DoS) attack using dSniff, aims to bring down a computer system or network so that its intended users…

E-Commerce Data: The Secret Behind Any Successful E-Commerce Business

1 year ago

In the 21st century, data is a valuable asset for businesses operating in all industries, including E-Commerce, health, travel, etc.…

Nuclearpond : A Utility Leveraging Nuclei To Perform Internet Wide Scans For The Cost Of A Cup Of Coffee

1 year ago

Nuclear Pond is used to leverage Nuclei in the cloud with unremarkable speed, flexibility, and perform internet wide scans for…

PowerMeUp : A Small Library Of Powershell Scripts For Post Exploitation That You May Need Or Use!

1 year ago

This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file…

Striker : A Command And Control (C2)

1 year ago

Striker is a simple Command and Control (C2) program. This project is under active development. Most of the features are…