ct-exposer : An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs

0
ct-exposer will query the CT logs for a given domain, and then try to do DNS lookups for the domains to see which ones...

Munin – Online Hash Checker For Virustotal & Other Services

0
Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries the following services: Virustotal ...

Libssh-Scanner : Script to identify hosts vulnerable to CVE-2018-10933

0
Libssh-Scanner is a python based script to identify hosts vulnerable to CVE-2018-10933. Libssh scanner has two modes: passive (banner grabbing) and aggressive (bypass auth)...

Metadata-Attacker : A Tool To Generate Media Files With Malicious Metadata

0
Metadata-Attacker is a open source pentesting tools you're able to create an image (.jpg), audio (.mp3) or video (.mp4) file containing your custom metadata...

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials Along With Session...

0
Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This...

Infog – Information Gathering Tool

0
InfoG is a Shellscript to perform Information Gathering. Infog Features Check Website info Check Phone info IP Tracker Check Valid E-mail Check if site is...

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

0
SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...

Nameles – Open Source Entropy Based Invalid Traffic Detection & Pre-bid Filtering

0
Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad...

imR0T – Encryption to Your Whatsapp Contact

0
imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with new multi encryption based...

RemoteRecon – Remote Recon and Collection

0
RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...