Kali Linux

Android_Hid : Use Android As Rubber Ducky Against Another Android Device

Android_Hid is a tool used by android as Rubber Ducky against targeted Android device or PC. HID Attack Using Android…

3 years ago

Kics : Find Security Vulnerabilities & Compliance Issues

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.…

3 years ago

Boomerang : A Tool To Expose Multiple Internal Servers To Web/Cloud

Boomerang is a tool to expose multiple internal servers to web/cloud using HTTP+TCP Tunneling. The Server will expose 2 ports…

3 years ago

How to get free Instagram Followers fast?

Do you need a lot of followers on Instagram for free? Are you surfing the internet to find ways to…

3 years ago

BadOutlook : Malicious Outlook Reader

BadOutlook is a simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based…

3 years ago

Gitrecon : OSINT Tool To Get Information From A Github Profile

Gitrecon is a OSINT tool to get information from a Github or Gitlab profile and find user's email addresses leaked…

3 years ago

How to Play Apex Legends: A Beginner’s Guide and Tips

Apex legends is a Battle Royale, first-person-shooter video game that has taken the gaming world by storm. Many people are…

3 years ago

Gain real followers or likes on Instagram using the Followers Gallery app

We love to share posts on Instagram merely because we get likes, comment and shares from our friends and family…

3 years ago

Where To Take Advantage Of Optimized Gaming Performance

Last year, we ran an article about ‘How to Improve Gaming Performance on Your PC’. It shared tips on everything for…

3 years ago

CTF-Party : A Ruby Library To Enhance & Speed Up Script/Exploit

CTF-Party is a library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters,…

3 years ago