AMSI-Bypass-HWBP : A Tool For Evading AMSI Detection

0
AMSI (Antimalware Scan Interface) is a Windows feature designed to help protect systems from malware by scanning scripts and files for malicious content. However,...

DEDSEC_BOTNET : A Comprehensive Tool For Penetration Testing And Ethical Hacking

0
DEDSEC_BOTNET is a Linux-based tool designed for creating and managing advanced botnet payloads. It is intended for use in penetration testing, ethical hacking, and...

JS Snitch : Hidden Secrets In JavaScript Files

0
JS Snitch is a powerful command-line tool designed to scan remote JavaScript files for potential secrets or credentials. It leverages the capabilities of Trufflehog...

RunAs-Stealer : A Credential Stealing Tool

0
RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart Keylogging, and Remote Debugging....

SubCat v1.3.1 : A Comprehensive Subdomain Enumeration Tool

0
SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable asset for penetration testers, bug bounty hunters, and security...

NFCGate : A Comprehensive NFC Traffic Analysis Tool

0
NFCGate is an innovative Android application designed for capturing, analyzing, and modifying NFC traffic. Developed by students at the Secure Mobile Networking Lab at...

ShellOpsLog : A Lightweight Command Logger

0
ShellOpsLog is a versatile tool designed to capture and log all executed commands during various operations, such as red and purple team engagements. It...

CPUMicrocodes : A Gateway To Advanced CPU Microcode Management And Optimization

0
CPUMicrocodes is a comprehensive repository of microcodes for Intel, AMD, VIA, and Freescale CPUs. Microcode is a low-level firmware that translates machine code instructions...

Tweet-Machine : Hidden Twitter Histories With Advanced OSINT Capabilities

0
Tweet-Machine is an Open-Source Intelligence (OSINT) tool designed to retrieve deleted tweets and replies from any Twitter user, even if their account has been...

Hiphp : Mastering Remote Management Of PHP Websites

0
Hiphp, developed by Yasserbdj96, is an open-source tool designed to create a backdoor for controlling PHP-based websites. It operates via HTTP/HTTPS protocols and leverages...
Command-Line Techniques for Listing Linux Users

Command-Line Techniques for Listing Linux Users

0
Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing how to list users efficiently helps you audit your...
Exploring User Management in Linux Systems

Exploring User Management in Linux Systems

0
User management is a critical aspect of Linux administration. Each user in a Linux system has specific permissions, roles, and files associated with their...
How to List Users in Linux

How to List Users in Linux

0
Managing users is an essential part of Linux system administration. Knowing how to list all users helps you monitor system access, manage permissions, and...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...