Kali Linux

Mubeng : An Incredibly Fast Proxy Checker And IP Rotator With Ease

Mubeng is an incredibly fast proxy checker & IP rotator with ease. Features Proxy IP rotator: Rotates your IP address…

3 years ago

Snuffleupagus : Security Module For Php7 And Php8 – Killing Bugclasses And Virtual-Patching The Rest

Snuffleupagus is a PHP 7+ and 8+ module designed to drastically raise the cost of attacks against websites, by killing entire bug…

3 years ago

Waybackurls : Fetch All The URLs That The Wayback Machine Knows About For A Domain

Wayback urls accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout. Usage…

3 years ago

Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks

Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and Moreā€¦ Use…

3 years ago

Cybersecurity Concerns for Remote Learning and Work in 2021

The first year of the COVID-19 pandemic was quite challenging for people and organizations due to the spread of the…

3 years ago

CyberBattleSim : An Experimentation And Research Platform To Investigate

CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network…

3 years ago

DNSObserver : A Handy DNS Service Written In Go To Aid In The Detection

DNSObserver is a handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities.…

3 years ago

Where To Start Guide For Beginners & New Players: Cod Modern Warfare Multiplayer

You may be a pro or a newbie; this COD modern warfare multiplayer guide will surely hone your multiplayer gameplay.…

3 years ago

5 Reasons Why Web Security Matters

You might lead an active online life. Perhaps you spend a ton of time on sites like YouTube, Facebook, or…

3 years ago

VAST : Visibility Across Space And Time

VAST is a tool for the network telemetry engine for data-driven security investigations. Key Features High-Throughput Ingestion: import numerous log…

3 years ago