Tookie-osint : A Powerful Tool For OSINT Enthusiasts

Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input. Tookie-osint is similar to the tool called Sherlock. It discovers all the user accounts across different websites and Tookie-osint is successful at this task almost 80% of the time. Our tool …

TJ-OSINT-Notebook : Your Comprehensive Resource For Advanced OSINT Operations And Techniques

This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations for performing reconaissance and OSINT operations. This Notebook has helped me in many situations to learn more about OSINT and how to analyze the data that is out there on the internet. Included in the …

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there are some others who don’t have any slightest idea how it can be done. For the sake of your ease we are writing this article, so you would be able to choose the best way when it …

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary. The server, client, and implant all support MacOS, Windows, and Linux (and possibly every Golang compiler target but …

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once it has finished scanning all the files it generates a report. It was originally developed within the OpenStack Security Project and …

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason why you’ll experience identity theft and security breaches. Aside from being careful about your online activities, hiding your IP address can be a good idea to maintain your safety and security online. The Internet Protocol …

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the Comprehensive Penetration testing tools list that covers Performing Penetration testing Operation in all the Environment. 1. Kali Linux 2018.3 Release The Penetration Testing and Ethical Hacking Linux Distribution! Kali 2018.3 brings up the kernel version upto 4.17.0 …

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is recognized as better than Windows. One more proof is that Linux is introduced in the newest cars. Recently, Google has released hardware for the automotive market that works with the Linux operating system. And this is not …

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers. Netdata provides unparalleled insights, in real-time, of everything happening on the systems it runs (including web servers, databases, applications), using highly interactive web dashboards. It can run autonomously, …