Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are…
This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations…
One of the biggest advantages of the blockchain is how safe it is. Since there is no single server, there…
There are many people who know quite well how to track someone by cell phone number, but there are some…
Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled…
Bandit is a tool designed to find common security issues in Python code. To do this it processes each file,…
The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason…
Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the Comprehensive Penetration…
The popularity of Linux in the world is gaining momentum. This is because in many areas it is recognized as…
Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you…