Kali Linux

Teatime : A Blockchain RPC Attack Framework

Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a…

4 years ago

Fake SMS : Skip Phone Verification By Using A Proxy

Fake SMS is a simple command line tool using which you can skip phone number based SMS verification by using…

4 years ago

10 Best SEO plugin for WordPress WooCommerce

SEO plugins are the best way to boost WordPress WooCommerce websites in search engines like Google, Yahoo, and Bing. The best…

4 years ago

WdToggle : Direct System Calls To Enable WDigest Credential Caching

WdToggle is a Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls to enable WDigest credential…

4 years ago

Gatekeeper : First Open-Source DDoS Protection System

Gatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it…

4 years ago

Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently,…

4 years ago

OpenWifiPass : An Open Source Implementation Of Apple’s Wi-Fi Password

OpenWifiPass open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol. Requirements Hardware: Bluetooth Low Energy radio,…

4 years ago

5 Best Online Cyber Security Courses

Over the years, technology has advanced and evolved, with more enterprises moving to online platforms. However, with this evolution, the…

4 years ago

GitLab Watchman : Monitoring GitLab For Sensitive Data Shared Publicly

GitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally.…

4 years ago

Understanding the Desktop as a Service Model

You may have heard of software as a service before, which some people abbreviate as SaaS. Not as many people…

4 years ago