Scrounger – Mobile Application Testing Toolkit

0
Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

0
Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...

theZoo – A Repository Of LIVE Malwares For Your Own Joy & Pleasure

0
theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis to have access to live malware, analyses...

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

0
WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...

Nemesis – A Command Line Network Packet Crafting & Injecting Utility

0
The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken...

Tool-X : Kali Linux Hacking Tool Installer

0
Tool-X is a Kali linux hacking Tool installer, with the help of it you can install best hacking tools in Rooted or Non Rooted...

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

0
A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords ...

UploadScanner : HTTP file upload scanner for Burp Proxy

0
UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a standard task for every...

Darling – Darwin/Mac OS Emulation Layer For Linux

0
Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git...

GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment

0
GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...