Sherlock : Find Usernames Across Social Networks

0

Sherlock Project provides a very powerfull command line tool called Sherlock to find usernames across many social networks. It requires Python 3.6 or higher and works on MacOS, Linux and Windows. Installation NOTE: Python 3.6 or higher is required. #clone the repo$ git clone https://github.com/sherlock-project/sherlock.git#change the working directory to sherlock$ cd sherlock#install python3 and python3-pip if not exist#install the requirements$ pip3 install -r...

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

0

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted labels. The LST file can be generated in IDA from the File menu: Produce file -> Create LST file… Example $ python3 lst2x64dbg.py sample.lst ghidra2x64dbg This script extracts all the labels...

Spyse : Python API Wrapper & Command-Line Client For The Tools Hosted On Spyse.com

0

Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL / TLS encryption certificate providers, data centers and business analysts. All Spyse online solutions are represented by thematic services that have a single platform for collecting, processing and aggregating information. Supports the following APIs: DNStableFindSubdomainsCertDBASlookupPortMapDomainsDB Python API wrapper and command-line client for the...

Windows Linux Kernel Is Now Available Via WSL 2

0

At the point when Microsoft first reported bash on Windows and brought Linux inside Windows as Windows Subsystem for Linux or WSL, few would have imagined that the following stage brings the genuine Linux piece inside Windows working framework. Truly, what we expected was right, Microsoft just released another Windows 10 Insider Preview build, highlighting the Windows Subsystem for...

PTF : A Way For Modular Support For Up-To-Date Tools

0

PTF( PenTesters Framework) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters, we've been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those "go to" tools that we use on a regular basis, and...

Scapy : Python-Based Interactive Packet Manipulation Program & Library

0

Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work. It...

Best Way to Learn Programming Online If You’re Tired of Books and Tutors

0

Today programming is taking the reins of the world's labor market. Ever developing, much promising and forward-looking, it's really worthwhile learning and implementing.  Coding brings voluminous profit in business, so every company prefers hiring those candidates who are well aware of the programming world with its burning innovations. However, many students feel like programming is something beyond their reach – even...

TwitterShadowBanV2 : Twitter Shadowban Tests

0

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the usual babel magic. git clone https://github.com/shadowban-eu/TwitterShadowBanV2 && cd TwitterShadowBanV2 npm install Since we are using a php backend for request proxying, you will also need PHP. The gulp script uses php-cli's webserver. Debian apt-get install php7.2-cli Finally, use the default gulp task to start...

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

0

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. PivotSuite as a Server : If the compromised host is directly accessible (Forward Connection) from Our pentest...

Lynis : Security Auditing Tool for Unix/Linux Systems

0

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth security scan. Software packages is available by clicking here. Requirements Shell and basic utilities Permissions Normal user or preferable root permissions Installation Installation via package Installing the tool via a package manager is one option to get started with it. For most operating systems and...