Kali Linux

Token Breaker : JSON RSA To HMAC & None Algorithm Vulnerability POC

Token Breaker is focused on 2 particular vulnerability related to JWT tokens. None AlgorithmRSAtoHMAC Refer to this link about insights…

5 years ago

Pythem – Penetration Testing Framework

Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and…

5 years ago

The Role of Digital Forensics in Solving Cyber Crimes

Your mobile app developers today have to understand more than simply putting together some code. They have to understand cybersecurity…

5 years ago

SAyHello – Capturing Audio (.Wav) From Target Using A Link

SAyHello is a tool used to capturing audio (.Wav) from target using a link. How it works? After the user…

5 years ago

Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core…

5 years ago

Recon : Enumerate A Target Based Off Of Nmap Results

Recon enumerate a target based off Of Nmap results. Features The purpose of O.G. Auto-Recon is to automate the initial…

5 years ago

Why is Cyber Crime Starts Growing? Detailed Report

In the era of modern technologies when almost all the data about us is available online, the level of cyber…

5 years ago

Zip Cracker : Python Script To Crack Zip Password With Dictionary Attack

Zip Cracker is a python script To crack zip password With dictionary attack and also use crunch as Pipeline. This…

5 years ago

DroidTracker – Script To Generate An Android App To Track Location In Real Time

DroidTracker is a script to generate an Android App to track location in real time. Features Custom App Name2 Port…

5 years ago

IOX : Tool For Port Forward & Intranet Proxy

IOX is a tool for port forward & intranet proxy, just like lcx/ew, but better. Why Write? lcx and ew…

5 years ago