Wednesday, June 16, 2021
Home Tags Bitshifting

Tag: Bitshifting

Must Need

Syborg : Recursive DNS Subdomain Enumerator With Dead-End Avoidance System

Syborg : Recursive DNS Subdomain Enumerator With Dead-End Avoidance System

Syborg is a recursive DNS subdomain enumerator with dead-end avoidance system (beta). It is a Recursive DNS Domain Enumerator...
IntelOwl : Analyze Files, Domains, IPs In Multiple Ways From A Single API At Scale

IntelOwl : Analyze Files, Domains, IPs In Multiple Ways From A...

IntelOwl is composed of analyzers that can be run to retrieve data from external sources (like VirusTotal or AbuseIPDB) or to generate...
BPYTOP : Linux/OSX/FreeBSD Resource Monitor

BPYTOP : Linux/OSX/FreeBSD Resource Monitor

BPYTOP is a resource monitor that shows usage and stats for processor, memory, disks, network and processes. Features
Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution

Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution

We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the links to...
Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the...
Cybersecurity : Tips for the Best Measures to Protect Your Data

Cybersecurity : Tips for the Best Measures to Protect Your Data

Cybersecurity is becoming a challenge to most individuals in society nowadays. People are losing money, among other essentials, through online fraud. Now,...
Self XSS  :  Grab Cookies Tricking Users Into Running Malicious Code

Self XSS : Grab Cookies Tricking Users Into Running...

Self XSS attack using bit.ly to grab cookies tricking users into running malicious code. How it works?