Thursday, April 9, 2020

Security Hacker

Security Hacker

Home Security Hacker
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason...

Must Need

Best Writing Tools Linux

4 Best Writing Tools Linux

Every writer would undoubtedly use a helping hand when it comes to producing great content. As such, having access to writing tools is paramount;...
FockCache : Minimalized Test Cache Poisoning

FockCache : Minimalized Test Cache Poisoning

FockCache is a minimalized test cache poisoning. It tries to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages.
OSIF : Open Source Information Facebook

OSIF : Open Source Information Facebook

OSIF is an accurate Facebook account information gathering, all sensitive information can be easily gathered even though the target converts all of...
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network...
PESTO – PE (Files) Statistical Tool

PESTO – PE (Files) Statistical Tool

PESTO is a Python script that extracts and saves in a database some PE file security characteristics or flags searching for every...
Leaked

Leaked 2.0 – A Checking tool for Hash codes, Passwords and...

Leaked 2.0 is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses...
Nginx Log Check : Nginx Log Security Analysis Script

Nginx Log Check : Nginx Log Security Analysis Script

Nginx Log Check is a nothing but a Nginx Log Security Analysis Script. Following are some of the feature for the script...