Masky : Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via...

0
Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A command line tool has...

Awesome-Password-Cracking :A Curated List Of Awesome Tools, Research, Papers And Other Projects

0
Awesome-Password-Cracking is a curated list of awesome tools, research, papers and other projects related to password cracking and password security. Read the guidelines before contributing! In short: List...

Autodeauth : A Tool Built To Automatically Deauth Local Networks

0
Autodeauth is a tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $ chmod +x setup.sh$ sudo ./setup.sh This...

Toxssin : An XSS Exploitation Command-Line Interface And Payload Generator

0
Toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of an https server that...

Rekono : Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically

0
Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the...

ReconPal : Leveraging NLP For Infosec

0
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs...

System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources,...

0
System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars...

dBmonster : Track WiFi Devices With Their Recieved Signal Strength

0
dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their sent packets (sniffed with TShark)....

Concealed_Code_Execution : Tools And Technical Write-Ups Describing Attacking Techniques

0
Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here you will find explanations...

RPCMon : RPC Monitor Tool Based On Event Tracing For Windows

0
RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like Procmon for easy usage,...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...