Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by R K
R K
2800 POSTS
0 COMMENTS
Kali Linux
SteaLinG : Open-Source Penetration Testing Framework Designed For Social Engineering
R K
-
October 18, 2022
0
Kali Linux
Monkey365 – Tool For Security Consultants Microsoft 365
R K
-
October 17, 2022
0
Kali Linux
HSTP – Simple Hyper Service Transfer Protocol On Networks
R K
-
October 17, 2022
0
Kali Linux
EvilnoVNC – Ready To Go Phishing Platform
R K
-
October 14, 2022
0
Uncategorized
AoratosWin : A Tool That Removes Traces Of Executed Applications On...
R K
-
October 14, 2022
0
Kali Linux
Cloudfox – Automating Situational Awareness For Cloud Penetration Tests
R K
-
October 13, 2022
0
Kali Linux
Arsenal – Recon Tool Installer
R K
-
October 12, 2022
0
Kali Linux
Erlik 2 : Vulnerable Flask App
R K
-
October 11, 2022
0
Kali Linux
Utkuici – Nessus Automation
R K
-
October 11, 2022
0
Kali Linux
Java-Remote-Class-Loader : Tool To Send Java Bytecode Victims To Load &...
R K
-
October 10, 2022
0
1
...
20
21
22
...
280
Page 21 of 280
APPLICATIONS
Dumpscan : Tool To Extract And Dump Secrets From Kernel And Windows Minidump Formats
R K
-
August 1, 2022
Ansible Role : Bloodhound-CE (Ludus) – A Quick Deployment Guide
Varshini
-
March 18, 2024
Redherd Framework : A Collaborative And Serverless Framework
R K
-
December 8, 2021
SilentHound : Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups,...
R K
-
August 16, 2022
HOT NEWS
LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping...
Varshini
-
December 21, 2023
0
Cyber security
With the help of LDAP Ping requests (cLDAP), "LDAP Nom Nom" is a powerful tool that quickly and quietly brute-forces Active Directory usernames. This...