7 Risks & Challenges Dynamic Application Security Testing Solves

1 year ago

Web apps are the cat’s meow nowadays — every business, big or small, has one. Every company uses them, Whether…

PhoneSploit-Pro : An All-In-One Hacking Tool To Remotely Exploit Android Devices Using ADB And Metasploit-Framework To Get A Meterpreter Session

1 year ago

PhoneSploit with Metasploit Integration An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug…

Kubei : A Flexible Kubernetes Runtime Scanner

1 year ago

KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and…

auditpolCIS : CIS Benchmark Testing Of Windows SIEM Configuration

1 year ago

auditpolCIS is a CIS Benchmark testing of Windows SIEM configuration. This is an application for testing the configuration of Windows…

PortEx : Java Library To Analyse Portable Executable Files With A Special Focus On Malware Analysis And PE Malformation Robustness

1 year ago

PortEx is a Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation…

Vid2img-extract all frame from a given video

1 year ago

Introduction to Vid2img Tool: A script written in Python called the vid2img tool can extract every frame from a given…

404 Frame – Infiltrating websites is now easy

1 year ago

What is a 404 Frame? Most tools for hacking a website are found in the 404 Frame. In this way,…

jupyter-kali

1 year ago

Introduction A Kali-based container for recon and enumeration using JupyterLab hosted on Docker. Jupyter Notebook is an open-source web application…

Passwordless Authentication Should Become Mainstream by 2023

1 year ago

Since the days of Ancient Rome and Egypt, people have used passwords to authenticate and grant access. Nowadays, passwords are…

Email2PhoneNumber: Obtain Phone Number via Email Address

1 year ago

Introduction  An open-source intelligence (OSINT) tool called Email2PhoneNumber enables you to discover a target's phone number simply by knowing his…