Kali Linux

Pythem – Penetration Testing Framework

Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and…

5 years ago

The Role of Digital Forensics in Solving Cyber Crimes

Your mobile app developers today have to understand more than simply putting together some code. They have to understand cybersecurity…

5 years ago

SAyHello – Capturing Audio (.Wav) From Target Using A Link

SAyHello is a tool used to capturing audio (.Wav) from target using a link. How it works? After the user…

5 years ago

Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core…

5 years ago

Recon : Enumerate A Target Based Off Of Nmap Results

Recon enumerate a target based off Of Nmap results. Features The purpose of O.G. Auto-Recon is to automate the initial…

5 years ago

Why is Cyber Crime Starts Growing? Detailed Report

In the era of modern technologies when almost all the data about us is available online, the level of cyber…

5 years ago

Zip Cracker : Python Script To Crack Zip Password With Dictionary Attack

Zip Cracker is a python script To crack zip password With dictionary attack and also use crunch as Pipeline. This…

5 years ago

DroidTracker – Script To Generate An Android App To Track Location In Real Time

DroidTracker is a script to generate an Android App to track location in real time. Features Custom App Name2 Port…

5 years ago

IOX : Tool For Port Forward & Intranet Proxy

IOX is a tool for port forward & intranet proxy, just like lcx/ew, but better. Why Write? lcx and ew…

5 years ago

OSS-Fuzz : Continuous Fuzzing For Open Source Software

In cooperation with the Core Infrastructure Initiative, OSS-Fuzz aims to make common open source software more secure and stable by…

5 years ago