Cyber security

OSINT Toolkit – Empowering Security Analysts With Comprehensive Cyber Threat Intelligence

Designed as a full-stack web application, this tool amalgamates a plethora of services to streamline the work of security analysts.…

2 years ago

Estensioni Chrome OSINT : Harnessing The Power Of Google Chrome For Open-Source Intelligence

Comprehensive guide to leveraging Google Chrome's extensions for Open-Source Intelligence (OSINT) tasks. In this article, we delve into a curated…

2 years ago

Linux For OSINT. 21-Day : Mastering The Command Line For Beginners

The course is primarily intended for those who are professionally involved in or simply interested in OSINT. And you will…

2 years ago

Python For OSINT : A 21-Day Journey To Mastering Open Source Intelligence

Embark on a 21-day journey to harness the power of Python for Open Source Intelligence (OSINT) with our comprehensive course.…

2 years ago

Prying Deep – Unveiling The Depths Of The Web

I've seen multiple projects out there in GitHub, that are crawlers for the deep web, but most of them did…

2 years ago

OSINTk.o – Kali Linux Based ISO For OSINT Investigations.

OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts. The idea behind this project is to…

2 years ago

Cify – A WiFi Hacking Tool

Cify is a Ruby-based WiFi hacking tool designed for penetration testers, security researchers, and network administrators to assess the security…

2 years ago

VisionServices Multi-Tool : A Comprehensive Overview

Dive into the world of cyber security with our exploration of VisionServices Multi-Tool. Developed in Python, this versatile tool offers…

2 years ago

MobileHackersWeapons – The Arsenal Of Mobile Hackers

A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting. The clandestine tools and techniques of…

2 years ago

GoHTools – Your Go-to Golang Hacking Suite

Dive into the world of cybersecurity with GoHTools, a comprehensive collection of hacking utilities crafted in Golang. From DNS manipulation…

2 years ago