Okta Terrify – Exposing Vulnerabilities In Passwordless Authentication

0
This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The presentation deck and demonstration...

Wstunnel – Revolutionizing Network Access Through Advanced Tunneling Techniques

0
Most of the time when you are using a public network, you are behind some kind of firewall or proxy. One of their purpose...

Installation – Comprehensive Guide To Using Androguard

0
The versatile capabilities of Androguard, a powerful tool for reverse engineering Android applications. This guide provides a step-by-step overview on how to install Androguard...

Netis Cloud Probe – Bridging Network Monitoring Gaps ith Advanced Packet Capture Tools

0
Netis Cloud Probe (Packet Agent, name used before)is an open source project to deal with such situation: it captures packets on Machine A but has to...

Twayback – Downloading Deleted Tweets From The Wayback Machine, Made Easy

0
Sad News July 2023 - Due to recent changes to the Twitter platform, this tool is unable to work as intended. Login is required...

Darvester GEN2 – Revolutionizing Discord Data Harvesting With Enhanced OSINT Capabilities

0
The next-generation tool in Discord user and guild information harvesting. Built on Dart/Flutter, this platform offers a comprehensive suite of OSINT capabilities, ensuring compliance...

Eclipse : The AI-Driven Sensitive Information Detection Tool

0
Eclipse was designed as a part of Nebula Pro, the first AI Powered Penetration Testing Application. Eclipse was designed to address the growing concerns surrounding...

GearGoat – A Comprehensive Guide To Using CaringCaribou For CAN Network Analysis

0
To find out the arbitration IDs and the corresponding message data and positional bytes for all the actions in GearGoat using CaringCaribou. Solution Step 0: To install...

Spearf1sh – A Comprehensive Guide To The Embedded Hacking Tool And Distribution

0
Spearf1sh Embedded Hacking Tool and Distro. The ultimate embedded hacking tool designed for Zynq and Pynq development boards. This specialized distro leverages the power...

Yin Omega – The Ultimate Toolkit For Cybersecurity Professionals

0
Public Release which includes useful tools for Hacking, Cracking, OSINT. This project is developed in C# Winforms, leveraging the UI framework from SkeetUI. While the...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...