debugHunter : Discover Hidden Debugging Parameters And Uncover Web Application Secrets

0
debugHunter is used to discover hidden debugging parameters and uncover web application secrets This Chrome extension scans websites for debugging parameters and notifies you when...

Unveiling the Power of John the Ripper: A Password Cracking Tool

0
Passwords are the first line of defense for most computer systems and online accounts. A strong, complex password can help thwart hackers and unauthorized...

Pinacolada : Wireless Intrusion Detection System For Hak5’s WiFi Coconut

0
Pinacolada is a Wireless Intrusion Detection System for Hak5's WiFi Coconut. Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as...

QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android...

0
QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security of Android applications. The security of...

Reportly : An AzureAD User Activity Report Tool

0
Reportly is an AzureAD user activity report tool. About the tool This is a tool that will help blue teams during a cloud incident. When running...
Ettercap Sniff Passwords

How to Use Ettercap to Intercept and Sniff Passwords

0
For man-in-the-middle attacks, Ettercap is a complete suite. It includes live connection sniffing, real-time content filtering, and other intriguing techniques. It has many network and...

WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance

0
WindowSpy is a Cobalt Strike Beacon Object File meant for targetted user surveillance. The goal of this project was to trigger surveillance capabilities only...

SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer

0
SilentMoonwalk is a PoC Implementation of a fully dynamic call stack spoofer. TL;DR SilentMoonwalk is a PoC implementation of a fully dynamic call stack spoofer,...

Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation

0
Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live migrate the attacker to the...
How to Use Snort

How to Use the Snort IDS/IPS Complete Practical Guide

0
Snort is a widely used open-source Network Intrusion Detection System (NIDS) that can analyze network traffic and detect potential security threats. It works by...
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...