Security Hacker

TJ-OSINT-Notebook : Your Comprehensive Resource For Advanced OSINT Operations And Techniques

This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations…

3 weeks ago

Can Bitcoin Be Hacked? How To Keep It Safe

One of the biggest advantages of the blockchain is how safe it is. Since there is no single server, there…

3 years ago

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there are some…

4 years ago

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled…

5 years ago

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit is a tool designed to find common security issues in Python code. To do this it processes each file,…

5 years ago

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason…

5 years ago

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the Comprehensive Penetration…

5 years ago

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is recognized as…

5 years ago

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you…

5 years ago

PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering

PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble managed and…

5 years ago