Hacking Tools

DetectItEasy With Python – A Comprehensive Guide

DetectItEasy-Python is a powerful tool designed to streamline file scanning and analysis using Python bindings. This article guides you through…

6 months ago

Sinon – Modular Windows Burn-In Automation With Generative AI For Deception

Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating…

6 months ago

IFL – Interactive Functions List : Enhancing IDA Pro With Advanced Function Navigation nd Import Features

Discover the power of the IFL - Interactive Functions List, a dynamic plugin designed to elevate your experience with IDA…

6 months ago

Check-If-Email-Exists : A Tool To Verify Email Addresses Without Sending Emails

This is open-source, but I also offer a SaaS solution that has check-if-email-exists packaged in a nice friendly web interface. If you are interested,…

6 months ago

Firefox Decrypt – Mastering Password Recovery For Mozilla Applications

As of 1.0.0 Python 3.9+ is required. Python 2 is no longer supported. If you encounter a problem, try the…

6 months ago

Gungnir : Monitoring Certificate Transparency In Real-Time

Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…

6 months ago

Invoke-ADEnum : Comprehensive Guide To Active Directory Enumeratio

Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum,…

6 months ago

Quick Setup Guide for Amnesiac – Running Directly From Memory

Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run,…

6 months ago

Okta Terrify – Exposing Vulnerabilities In Passwordless Authentication

This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The…

6 months ago

Wstunnel – Revolutionizing Network Access Through Advanced Tunneling Techniques

Most of the time when you are using a public network, you are behind some kind of firewall or proxy.…

6 months ago