Freeway – A Comprehensive Guide To WiFi Penetration Testing With Python
"Freeway" is a Python-based tool designed to enhance WiFi penetration testing and network security.
Utilizing the capabilities of Scapy, it equips ethical hackers and...
ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes
Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number...
DetectItEasy With Python – A Comprehensive Guide
DetectItEasy-Python is a powerful tool designed to streamline file scanning and analysis using Python bindings.
This article guides you through the straightforward installation process...
Sinon – Modular Windows Burn-In Automation With Generative AI For Deception
Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating deception hosts at scale...
IFL – Interactive Functions List : Enhancing IDA Pro With Advanced Function Navigation nd...
Discover the power of the IFL - Interactive Functions List, a dynamic plugin designed to elevate your experience with IDA Pro.
This user-friendly tool...
Check-If-Email-Exists : A Tool To Verify Email Addresses Without Sending Emails
This is open-source, but I also offer a SaaS solution that has check-if-email-exists packaged in a nice friendly web interface.
If you are interested, find out more at Reacher....
Firefox Decrypt – Mastering Password Recovery For Mozilla Applications
As of 1.0.0 Python 3.9+ is required. Python 2 is no longer supported. If you encounter a problem, try the latest release or check open issues...
Gungnir : Monitoring Certificate Transparency In Real-Time
Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.
Its primary purpose is...
Invoke-ADEnum : Comprehensive Guide To Active Directory Enumeratio
Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment.
With Invoke-ADEnum, you can enumerate various aspects...
Quick Setup Guide for Amnesiac – Running Directly From Memory
Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run, or clone the repository...