sttr – A Command Line Tool For String Transformations
sttr is command line software that allows you to quickly run various transformation operations on the string.
// With input prompt
sttr
// Direct input
sttr md5 "Hello World"
//...
Quick Start – Comprehensive Guide To Installing And Configuring Malcolm On Linux Platforms
The files required to build and run Malcolm are available on its ({{ site.github.repository_url }}/tree/{{ site.github.build_revision }}). Malcolm's source-code is released under the terms...
Machine Learning Tutorials Repository – Unlocking The Power Of AI Learning
Welcome to the Machine Learning Tutorials Repository! This is the go-to spot for all the code associated with my Twitter tutorials.
If you're passionate about...
Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang
Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known for its flexibility and...
Burp Suite Tutorial – A Web Application Penetration Testing Tool – Beginners Guide
In this Burp Suite Tutorial, we are going to elaborately describe the Burp Suite tool and its features that are bundled in a single...
Metasploit Framework – A Beginner’s Guide for Penetration Testing & Exploit Development
Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a collection of exploitation tools...
Whatweb – A Scanning Tool to Find Security Vulnerabilities in Web App
Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information...
Fantastic Storage Solutions for Tech Companies
Running a tech company can leave you with a lot of clutter. Trailing wires, old devices, paperwork, and filing cabinets might pile up to...
What to Look for in the Right SOC Program – A Complete Guide
SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter how big or...
Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6
Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in IPv6 networks.
You have to...