How to Play Apex Legends: A Beginner’s Guide and Tips
Apex legends is a Battle Royale, first-person-shooter video game that has taken the gaming world by storm. Many people are now flocking around EA's Battle Royale game, and it is easy to see why. Apex Legends has many things in common with other FPS games. It still has looting and shooting at the core, but not without twists. So, winning...
Gain real followers or likes on Instagram using the Followers Gallery app
We love to share posts on Instagram merely because we get likes, comment and shares from our friends and family members. The post with the maximum number of likes, shares and comment is considered to be with the highest engagement rate. People often want to increase the number of followers and attain 1 million followers in a quick time....
Where To Take Advantage Of Optimized Gaming Performance
Last year, we ran an article about ‘How to Improve Gaming Performance on Your PC’. It shared tips on everything for optimising bandwidth, to choosing the right graphics card, to upgrading your computer RAM. To many with more casual interest in the topic, these may seem like fairly involved, technical adjustments to consider. To a growing number of gamers though,...
CTF-Party : A Ruby Library To Enhance & Speed Up Script/Exploit
CTF-Party is a library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns. The philosophy is also to keep the library to be pure ruby (no dependencies) and not to re-implement what...
Godehashed : Tool That Uses The Dehashed.Com API To Search For Compromised Assets
Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis. Dehashed API You must supply the tool an api key. See apikey_template.txt for example. Installation To install the tool in CLI run the following command. Your $GOPATH must already be set. go get https://github.com/an00byss/godehashed Usage ./godehashed -s email -i apikey.txt...
ProxyLogon : PoC Exploit for Microsoft Exchange
ProxyLogon is a tool for PoC exploit for Microsoft exchange. How to use? python proxylogon.py <name or IP of server> <user@fqdn> Example python proxylogon.py primary administrator@lab.local If successful you will be dropped into a webshell. exit or quit to escape from the webshell (or ctrl+c) By default, it will create a file test.aspx. This can be changed. Download
Netmap.Js : Fast Browser-Based Network Discovery Module
netmap.js provides browser-based host discovery and port scanning capabilities to allow you to map website visitors' networks. It's quite fast, making use of es6-promise-pool to efficiently run the maximum number of concurrent connections browsers will allow. Motivation I needed a browser-based port scanner for an idea I was working on. I thought it would be a simple matter of importing an existing...
Subcert : Finds All The Subdomains From Certificate Transparency Logs
Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Setup Step 1: Install Python 3 apt-get install python3-pip Step 2: Clone the Repository git clone https://github.com/A3h1nt/Subcert.git Step 3: Install Dependencies pip3 install -r requirements.txt Step 4: Move the Directory to /opt mv subcert /opt/ Step 5: Add an alias in .bashrc to run the script from anywhere alias subcert="python3...
Mole : A Framework For Identifying & Exploiting Out-Of-Band Application Vulnerabilities
Mole is a framework for identifying and exploiting out-of-band (OOB) vulnerabilities. Installation & Setup Mole Install Python >= 3.6 virtualenv -p /usr/bin/python3 venvsource venv/bin/activate./venv/bin/pip3 install -r requirements.txtgit submodule update --init --recursive Set an API key in config.yml (must be the same for the client and server) DNS Configuration You'll need to configure the DNS records in your registrar to point to your mole server. Minimally, you'll...
Invoke SocksProxy : Socks Proxy & Reverse Socks Server Using Powershell
Invoke SocksProxy is a tool that creates a local or "reverse" Socks proxy using powershell. The local proxy is a simple Socks 4/5 proxy. The reverse proxy creates a tcp tunnel by initiating outbond SSL connections that can go through the system's proxy. The tunnel can then be used as a socks proxy on the remote host to pivot into...