BugBountyScanner : A Bash Script & Docker Image For Bug Bounty Reconnaissance

0

BugBountyScanner is a Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information output. Note: Using the script over a VPN is highly recommended. It's recommended to run BugBountyScanner from a server (VPS or home server), and not from your terminal. It is programmed to be low on resources, with potentially multiple...

Enrich your Bathroom with Aquatica Freestanding Tub

0

If you want to create a unique interior for your bathroom, then the freestanding tub is the perfect assistant. The highlight of the freestanding bathtub is that it stands away from the walls, right in the center of your bathroom. It becomes more than just a bathtub; it is a complete piece of furniture and interior design. The Quality Supplier Aquatica...

The best new cars coming to Dubai in 2021

0

Dubai has always been the place to look for luxurious cars. You will find various high-speed luxurious vehicles being driven on the roads of Dubai. The main reason behind that is the love of the cars of locals and the roads there are suited for high-speed vehicles too. Dubai is one the biggest markets for these vehicles. As a result...

RATel : An Open Source Penetration Test Tool

0

RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software. Screenshots Added Features Unicode management (20.02.21) for the version: beta_v0.1 Features RATelServer:Multiple ConnectionsBroadcast commands...

Pybeacon : A Collection Of Scripts For Dealing With Cobalt Strike Beacons In Python

0

PyBeacon is a collection of scripts for dealing with Cobalt Strike's encrypted traffic. It can encrypt/decrypt beacon metadata, as well as parse symmetric encrypted taskings. Scripts Included There is a small library which includes encryption/decoding methods, however some example scripts are included. stager-decode.py - this tool will simply decode a beacon DLL from a stager URL (you can use it to extract...

Can Bitcoin Be Hacked? How To Keep It Safe

0

One of the biggest advantages of the blockchain is how safe it is. Since there is no single server, there are not many ways to hack into it. After all, the blockchain is on millions of computers so any changes made on a hash on a computer that gets hacked would be seen by everybody else on the blockchain. Does...

SharpSphere : .NET Project For Attacking vCenter

0

SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter. It uses the vSphere Web Services API and exposes the following functions: Command & Control - In combination with F-Secure's C3, SharpSphere provides C&C into VMs using VMware Tools, with no direct network connectivity to the target VM required.Code Execution...

10 Best Student Software on Linux

0

Linux is an open-source operating system that has so much to offer to its users. Students can benefit from using Linux, thanks to the amazing apps and software that are at their disposal. So, if you're a student thinking about switching to Linux, or you already use it, this article is for you. We've created a list of the...

Teatime : A Blockchain RPC Attack Framework

0

Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a large variety of issues, ranging from information leaks to open accounts, and configuration manipulation. The goal is to enable tools scanning for vulnerable nodes and minimizing the risk of node-based attacks due to common vulnerabilities. Teatime uses a plugin-based architecture,...

Fake SMS : Skip Phone Verification By Using A Proxy

0

Fake SMS is a simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy. Note-1: This is just an experimental tool, do not use this in any banking transactions. Unethical use of this tool is strictly not encouraged." Note-2: The tool uses upmasked, A Eurpoean service...