Tamil S

LOLSpoof – A Clever Technique To Evade Command Line Detection And Maintain OPSEC

LOLSpoof is a an interactive shell program that automatically spoof the command line arguments of the spawned process. Just call…

10 months ago

FalconHound – Empowering Blue Teams With Automated BloodHound Integration

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more…

10 months ago

Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages…

10 months ago

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can…

10 months ago

DllNotificationInjection – Exploring A Novel Threadless Process Injection Technique

DllNotificationInection is a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification…

10 months ago

httpAlive – URL Analysis Tool For Web Application Penetration Test

Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent rotation, multithreading, and…

10 months ago

DDoS Scripts – Supercharging Your Kali Linux With Hacking Tools

Explore the world of DDoS scripts and hacking tools to enhance your Kali Linux experience. In this comprehensive guide, we…

10 months ago

katoolin – Streamline Your Kali Linux Tool Installation With This Comprehensive Guide

katoolin is a powerful tool that simplifies the installation of Kali Linux tools on compatible systems. With the ability to…

10 months ago

PwnDoc – Streamlining Pentest Reporting For Efficient Vulnerability Management

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx…

10 months ago

Bypass Fuzzer – Exploring A Powerful Tool For Testing End Point Security

This tool performs various checks via headers, path normalization, verbs, etc. to attempt to bypass ACL's or URL validation. It…

10 months ago