Saturday, July 20, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

No posts to display

Must Need

DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can be used to scan...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0 was released. It was...
Remote-Desktop-Caching

Remote-Desktop-Caching : Recover Old RDP (MSTSC) Session Information In The Form...

Remote-Desktop-Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team...
DarkSpiritz

DarkSpiritz : A Penetration Testing Framework For Linux, MacOS, and Windows...

DarkSpiritz is a penetration testing framework for Linux and Windows systems. Created by the SynTel Team it was a project of one of the...
Ponce : IDA Pro Plugin That Provides Users The Ability To Perform Taint Analysis & Symbolic Execution

Ponce : IDA Pro Plugin That Provides Users The Ability To...

Ponce is an IDA Pro plugin that provides users the ability to perform taint analysis and symbolic execution over binaries in...
RiskySPN

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing...

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout