Tookie-osint : A Powerful Tool For OSINT Enthusiasts
Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input....
TJ-OSINT-Notebook : Your Comprehensive Resource For Advanced OSINT Operations And Techniques
This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations for performing reconaissance and...
Can Bitcoin Be Hacked? How To Keep It Safe
One of the biggest advantages of the blockchain is how safe it is. Since there is no single server, there are not many ways...
Top 3 Best Ways to Track Someone by Cell Phone Number
There are many people who know quite well how to track someone by cell phone number, but there are some others who don’t have...
Sliver : Implant Framework
Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique...
Bandit : Tool Designed To Find Common Security Issues In Python Code
Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an AST from...
Important Reasons Why Hiding Your IP Address is a Good Idea
The
internet can be a goldmine of information, but if you’re not careful enough, it
can also be the reason why you’ll experience identity theft and...
Most Popular Hacking Tools in 2018
Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the Comprehensive Penetration testing tools list that...
Linux-based Autopilot and Other Technologies in Cars
The popularity of Linux in the world is gaining momentum. This is because in many areas it is recognized as better than Windows.
One more...
NetData : Real-time Performance Monitoring Tool
Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your...