Sunday, April 11, 2021

Security Hacker

Home Security Hacker
Can Bitcoin Be Hacked? How To Keep It Safe

Can Bitcoin Be Hacked? How To Keep It Safe

One of the biggest advantages of the blockchain is how safe it is. Since there is no single...
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this it processes...
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason...
Anevicon

Anevicon : A High-Performant UDP-Based Load Generator

Anevicon is a high-performant traffic generator, designed to be as convenient and reliable as it is possible.
Hacking tools

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the...
Linux Autopilot

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is...
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring...
PowerShellArsenal

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble...

Must Need

Nemesis

Nemesis – A Command Line Network Packet Crafting & Injecting Utility

The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken...
Cryptovenom : The Cryptography Swiss Army Knife

Cryptovenom : The Cryptography Swiss Army Knife

CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms, hash...
Anevicon

Anevicon : A High-Performant UDP-Based Load Generator

Anevicon is a high-performant traffic generator, designed to be as convenient and reliable as it is possible. It...
Konan – Advanced Web Application Dir Scanner

Konan – Advanced Web Application Dir Scanner

Konan is an advanced open source tool designed to brute force directories and files names on web/application servers. Installation
ADSearch : A Tool To Help Query AD Via The LDAP Protocol

ADSearch : A Tool To Help Query AD Via The LDAP...

ADSearch is a tool written for cobalt-strike's execute-assembly command that allows for more efficent querying of AD. Key...
Remot 3d

Remot3d – A Simple Tool Created For Large Pentesters

Remot 3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a...
Malware

What are the Types of Malware Infecting Your Computer

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without the user's permission. Software...