Kali Linux 2022.4 : Penetration Testing and Ethical Hacking Linux Distribution

0
Time for another Kali Linux release! – Kali Linux 2022.4. This release has various impressive updates. A summary of the changelog since August’s 2022.3 release: Microsoft...

Shennina : Automating Host Exploitation With AI

0
Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, and exploitation using Artificial...

laZzzy : Shellcode Loader, Developed Using Different Open-Source Libraries, That Demonstrates Different Execution Techniques

0
laZzzy is a shellcode loader that demonstrates different execution techniques commonly employed by malware. laZzzy was developed using different open-source header-only libraries. Features Direct syscalls and...

Octosuite : Advanced Github OSINT Framework

0
Octosuite is a framework fro gathering osint on GitHub users, repositories and organization. Features Fetches an organization's profile informationFetches an oganization's eventsReturns an organization's repositoriesReturns...

Codecepticon : .NET Application That Allows You To Obfuscate C#, VBA/VB6 (Macros), And PowerShell...

0
Codecepticon is a .NET application that allows you to obfuscate C#, VBA/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements...

Legitify : Detect & Remediate Misconfigurations & Security Risks Across All Your GitHub Assets

0
Legitify is a tool to strengthen the security posture of your GitHub organization. Detect and remediate misconfigurations, security and compliance issues across all your...

Pyramid : A Tool To Help Operate In EDRs’ Blind Spots

0
Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose of the tool is...

AzureGraph : Azure AD Enumeration Over MS Graph

0
AzureGraph is an Azure AD information gathering tool over Microsoft Graph. Thanks to Microsoft Graph technology, it is possible to obtain all kinds of information...

R4Ven : Track IP And GPS Location

0
Track User's Smartphone/Pc Ip And Gps Location. The tool hosts a fake website which uses an iframe to display a legit website and, if the...

Klyda : Highly Configurable Script For Dictionary/Spray Attacks Against Online Web Applications

0
The Klyda project has been created to aid in quick credential based attacks against online web applications. Klyda supports the use from simple password...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...