Simple Business Plan for Internet Café

0

A cyber cafe or internet cafe has been a favorite destination for millions of people for over 30 years. The cyber ​​cafe attracts with constant high-speed Internet, the latest video games, and high-tech computers. Due to the growing demand for video games, the popularity of e-sports, and remote forms of earning money, cyber cafes do not lose but only...

IPCDump : Tool For Tracing Interprocess Communication (IPC) On Linux

0

IPCDump is a tool for tracing inter-process communication (IPC) on Linux. It covers most of the common IPC mechanisms -- pipes, fifos, signals, UNIX sockets, loop-back-based networking, and pseudo-terminals. It's a useful tool for debugging multi-process applications, and it's also a simple way to understand how the different moving parts in your system communicate with one another. I t can...

Reasons to Rebrand Your Business

0

Rebranding your business could be the best or the worst decision a company could make. There have been instances where high-end companies have damaged their reputation due to bad rebranding, while for some it has worked wonders. To rebrand you need to spend time and energy into obtaining a buy-in first and then garnering information and resources on how...

CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names

0

CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization. This technique provides accurate results without the use of API keys, credentials, or even accessing the site directly. Formats can then be applied in the command line arguments to turn these names into email addresses, domain accounts, and more. For...

Vulnerablecode : A Free And Open Vulnerabilities Database

0

VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the data current. It is made by the FOSS community to improve and secure the open source software ecosystem. Why? The existing solutions are commercial proprietary vulnerability databases, which in itself does not make sense because the data is about FOSS (Free...

Kubesploit : A Cross-Platform Post-Exploitation HTTP/2 Command

0

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we noticed that most of the tools available today are aimed at passive scanning for vulnerabilities in the cluster, and there is a...

DNSPeep : Spy On The DNS Queries Your Computer Is Making

0

DNSPeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name server IP responseA incoming.telemetry.mozilla.org 192.168.1.1 CNAME: telemetry-incoming.r53-2.services.mozilla.com, CNAME: pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.com, A: 52.39.144.189, A: 54.191.136.131, A: 34.215.151.143, A: 54.149.208.57, A: 44.226.235.191, A: 52.10.174.113, A: 35.160.138.173, A: 44.238.190.78AAAA incoming.telemetry.mozilla.org 192.168.1.1 CNAME: telemetry-incoming.r53-2.services.mozilla.com, CNAME: pipeline-incoming-prod-elb-149169523.us-west-2.elb.amazonaws.comA www.google.com 192.168.1.1 A: 172.217.13.132AAAA www.google.com 192.168.1.1 AAAA: 2607:f8b0:4020:807::2004A www.neopets.com 192.168.1.1...

Overlord : Red Teaming Infrastructure Automation

0

Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user has to provide inputs by using the tool’s modules (e.g. C2, Email Server, HTTP web delivery server, Phishing server etc.) and the full infra / modules and scripts will be generated automatically on a cloud provider of choice. Currently...

BetterXencrypt : A Better Version Of Xencrypt

0

BetterXencrypt is a better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not FUD anymore and easily get caught by AMSI,i recode the stub and now it FUD again. And the original Xencrypt,if you see on the screenshot proof,he's tested on Windows 8,and if i test it on the newest...

Reproxy : Simple Edge Server / Reverse Proxy

0

Reproxy is a simple edge HTTP(s) server / reverse proxy supporting various providers (docker, static, file). One or more providers supply information about the requested server, requested URL, destination URL, and health check URL. It is distributed as a single binary or as a docker container. Automatic SSL termination with Let's EncryptSupport of user-provided SSL certificatesSimple but flexible proxy rulesStatic, command-line...