Tuesday, June 15, 2021

Security Hacker

Home Security Hacker
Can Bitcoin Be Hacked? How To Keep It Safe

Can Bitcoin Be Hacked? How To Keep It Safe

One of the biggest advantages of the blockchain is how safe it is. Since there is no single...
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this it processes...
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason...
Anevicon

Anevicon : A High-Performant UDP-Based Load Generator

Anevicon is a high-performant traffic generator, designed to be as convenient and reliable as it is possible.
Hacking tools

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the...
Linux Autopilot

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is...
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring...
PowerShellArsenal

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble...

Must Need

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.
Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages...
Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer...

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes & tweaks were introduced to...
Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For Security Vulnerabilities

Firmware Analysis Toolkit : To Emulate Firmware And Analyse It For...

Firmware analysis toolkit is a toolkit to emulate firmware and analyse it for security vulnerabilities. FAT is a toolkit built in order...
FireELF

FireELF : Fileless Linux Malware Framework

FireELF is a opensource fileless linux malware framework thats crossplatform and allows users to easily create and manage payloads.
Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains

Findomain : A Cross-Platform Tool That Use Certificate Transparency Logs To...

Findomain is a cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS. All supported...