SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For...

0
SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet. Google dorking is a...

CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And...

0
CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS...

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade...

0
Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions. Note: ...

Tracgram : Use Instagram location features to track an account

0
Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple: 1. Download this repository 2. Go through the...

Probable_Subdomains : Subdomains Analysis And Generation Tool

0
Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is...

Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup

0
Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP refers to the process of looking...

ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA

0
ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the...

Faraday : Open Source Vulnerability Management Platform

0
Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you...

Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!

0
Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py Options: -h, --help show this help message and...

OffensivePipeline : To Download And Build C# Tools, To Improve Their Evasion For Red...

0
OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.A common use...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...