REC2 : Rusty External Command And Control Tool

0
REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language. Designed for...

AMSI-Bypass-HWBP : A Tool For Evading AMSI Detection

0
AMSI (Antimalware Scan Interface) is a Windows feature designed to help protect systems from malware by scanning scripts and files for malicious content. However,...

BurpSuite-Xkeys : Mastering Key And Token Extraction For Web Security

0
Xkeys is a Burp Suite extension designed to extract interesting strings such as keys, secrets, and tokens from web pages. It operates as a...

DEDSEC_BOTNET : A Comprehensive Tool For Penetration Testing And Ethical Hacking

0
DEDSEC_BOTNET is a Linux-based tool designed for creating and managing advanced botnet payloads. It is intended for use in penetration testing, ethical hacking, and...

RunAs-Stealer : A Credential Stealing Tool

0
RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart Keylogging, and Remote Debugging....

IDOR Scanner : A Comprehensive Tool For Detecting Insecure Direct Object References

0
The IDOR Scanner is a powerful Burp Suite extension designed to identify potential Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. Written in...

SubCat v1.3.1 : A Comprehensive Subdomain Enumeration Tool

0
SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable asset for penetration testers, bug bounty hunters, and security...

NFCGate : A Comprehensive NFC Traffic Analysis Tool

0
NFCGate is an innovative Android application designed for capturing, analyzing, and modifying NFC traffic. Developed by students at the Secure Mobile Networking Lab at...

ShellOpsLog : A Lightweight Command Logger

0
ShellOpsLog is a versatile tool designed to capture and log all executed commands during various operations, such as red and purple team engagements. It...

Burp-Rxss-scan-TG : Enhancing XSS Scanning With Burp Suite Extensions

0
Burp Suite is a powerful tool for web application security testing, widely used by professionals to identify vulnerabilities such as cross-site scripting (XSS). The...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...