LoaderJsfinder – Fetches JavaScript Files

0
loaderjsfinder fetches JavaScript files quickly and comprehensively. jsFinder is a command-line tool written in Go that scans web pages to find JavaScript files linked in...

Bypass-403 A Simple Script For Bypassing 403

0
Bypass-403 is a A simple script just made for self use for bypassing 403 It can also be used to compare responses on verious conditions as...

LSMS – Linux Security And Monitoring Scripts

0
Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events...

Fiber – Using Fibers To Run In-Memory Code

0
A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the priority-based scheduling mechanism built...

XSS-Exploitation-Tool : A Penetration Testing Tool

0
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. Disclaimer: This tool is only for educational purpose, do...

Firefly – Black Box Fuzzer For Web Applications

0
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing a target with a...

GPOHunter – Active Directory Group Policy Security Analyzer

0
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs). It automates security checks and...

Installation Instructions And Folder Setup For Gcpwn On Kali Linux

0
If you want to use docker to run the tool, you can use the existing Dockerfile to create a container with the tool and...

Trace Labs Kali Linux Build Configuration

0
Trace Labs OSINT Distribution based on Kali Linux. It covers modifications to the default Kali repository, build steps using Docker or a Debian host,...

Kali Linux 2024.1 Released – What’s New!

0
Kali Linux is a Debian-based Linux distribution that is designed for digital forensics, penetration testing, and ethical hacking.  It comes pre-loaded with a variety of...
Command-Line Techniques for Listing Linux Users

Command-Line Techniques for Listing Linux Users

0
Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing how to list users efficiently helps you audit your...
Exploring User Management in Linux Systems

Exploring User Management in Linux Systems

0
User management is a critical aspect of Linux administration. Each user in a Linux system has specific permissions, roles, and files associated with their...
How to List Users in Linux

How to List Users in Linux

0
Managing users is an essential part of Linux system administration. Knowing how to list all users helps you monitor system access, manage permissions, and...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...