SubCat v1.3.1 : A Comprehensive Subdomain Enumeration Tool
SubCat is a powerful and efficient tool designed for subdomain discovery, making it an indispensable asset for penetration testers, bug bounty hunters, and security researchers. Version 1.3.1 of SubCat continues to build on its predecessors by offering a robust set of features that enhance its performance and versatility. Key Features Of SubCat v1.3.1 Fast Enumeration: SubCat leverages high-performance resolution and wildcard...
Mininterface : Simplifying GUI, TUI, CLI, And Config File Management
Mininterface is a powerful Python library designed to simplify the creation of user interfaces for applications. It allows developers to easily integrate GUI, TUI, CLI, and config file management into their projects with minimal code overhead. This article explores the features and functionalities of Mininterface, highlighting its ease of use and versatility. Key Features GUI and TUI Support: Mininterface automatically generates...
NFCGate : A Comprehensive NFC Traffic Analysis Tool
NFCGate is an innovative Android application designed for capturing, analyzing, and modifying NFC traffic. Developed by students at the Secure Mobile Networking Lab at TU Darmstadt, it serves as a valuable tool for security researchers aiming to reverse-engineer protocols or assess their security against traffic modifications. This article delves into the features, usage, and requirements of NFCGate. Features On-device Capture: NFCGate...
ShellOpsLog : A Lightweight Command Logger
ShellOpsLog is a versatile tool designed to capture and log all executed commands during various operations, such as red and purple team engagements. It provides a lightweight solution for tracking command history without recording their output. The logged commands are saved in a CSV file, making it easy to analyze and include in client deliverables or internal reviews. Key Features Portability:...
Burp-Rxss-scan-TG : Enhancing XSS Scanning With Burp Suite Extensions
Burp Suite is a powerful tool for web application security testing, widely used by professionals to identify vulnerabilities such as cross-site scripting (XSS). The Burp-Rxss-scan-TG extension is designed to enhance the scanning capabilities of Burp Suite for XSS vulnerabilities by leveraging custom payloads stored in a file named xss.txt. Functionality Of Burp-Rxss-scan-TG Custom Payload Management: Users can create a file named xss.txt...
GPT Crawler : A Tool For Custom GPT Creation
The GPT Crawler is a powerful tool designed to crawl websites and generate knowledge files that can be used to create custom GPT models from one or multiple URLs. This project, developed by Builder.io, allows users to easily build their own custom GPTs or assistants by leveraging web content. Key Features Of GPT Crawler Crawling Functionality: The tool crawls specified URLs...
CPUMicrocodes : A Gateway To Advanced CPU Microcode Management And Optimization
CPUMicrocodes is a comprehensive repository of microcodes for Intel, AMD, VIA, and Freescale CPUs. Microcode is a low-level firmware that translates machine code instructions into hardware-specific operations, playing a crucial role in CPU functionality, performance, and compatibility. The CPUMicrocodes repository is essential for upgrading, research, and development purposes, providing access to the latest production microcodes from official sources. Features Of...
Tweet-Machine : Hidden Twitter Histories With Advanced OSINT Capabilities
Tweet-Machine is an Open-Source Intelligence (OSINT) tool designed to retrieve deleted tweets and replies from any Twitter user, even if their account has been suspended. This tool is particularly useful for researchers, investigators, and anyone interested in analyzing historical Twitter data. Purpose And Functionality Tweet-Machine is built to provide comprehensive access to Twitter data that would otherwise be inaccessible due to...
2025-03-04 (Tuesday) : Group Claiming To Be BianLian Sends Paper-Based Extortion Letters via Postal Service
On March 4, 2025, a group claiming to be the notorious threat actor BianLian began sending paper-based extortion letters to executives at U.S.-based organizations. These letters demand ransom payments in Bitcoin to prevent the alleged disclosure of sensitive data, with amounts ranging from $200,000 to $500,00013. However, several factors suggest that these letters may not be from the actual...
Blindsight : Advanced Techniques In Red Teaming And LSASS Memory Exploitation
Blindsight is a red teaming tool designed to dump LSASS (Local Security Authority Subsystem Service) memory on Windows systems, bypassing basic countermeasures. It utilizes the Transactional NTFS (TxF API) to transparently scramble the memory dump, which helps avoid triggering antivirus, endpoint detection and response (EDR), and extended detection and response (XDR) systems. Functionality LSASS Memory Dumping: Blindsight allows users to dump...















.webp)