Advertisement

FalconHound – Empowering Blue Teams With Automated BloodHound Integration

0
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is...

Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

0
Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages web scraping techniques and...

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

0
gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can be found here: A Broken...

DllNotificationInjection – Exploring A Novel Threadless Process Injection Technique

0
DllNotificationInection is a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and...

httpAlive – URL Analysis Tool For Web Application Penetration Test

0
Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent rotation, multithreading, and colorized output, this versatile...

PwnDoc – Streamlining Pentest Reporting For Efficient Vulnerability Management

0
PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report.The main goal is...

Bypass Fuzzer – Exploring A Powerful Tool For Testing End Point Security

0
This tool performs various checks via headers, path normalization, verbs, etc. to attempt to bypass ACL's or URL validation. It will output the response codes...

SSH3 – Faster And Rich Secure Shell Using HTTP/3

0
SSH3 is a complete revisit of the SSH protocol, mapping its semantics on top of the HTTP mechanisms. In a nutshell, SSH3 uses QUIC+TLS1.3 for secure...

EasyEASM : Your Zero-Dollar Solution For Attack Surface Management

0
Easy EASM is just that... the easiest to set-up tool to give your organization visibility into its external facing assets. The industry is dominated by...

PMKID WPA2 Cracker – Decrypting WPA2 WiFi Networks The Easy Way

0
This program is a tool written in Python to recover the pre-shared key of a WPA2 WiFi network without any de-authentication or requiring any...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...