Friday, July 23, 2021
Home Tags CPU

Tag: CPU

Must Need

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering

Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your...
GCPBucketBrute  : A Script To Enumerate Google Storage Buckets

GCPBucketBrute : A Script To Enumerate Google Storage Buckets

GCPBucketBrute is a script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can...
5 Tips to Protect Yourself from Cyberattacks at The University

5 Tips to Protect Yourself from Cyberattacks at The University

Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as targets of...
Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages...
Re2Pcap : Create PCAP file From Raw HTTP Request Or Response In Seconds

Re2Pcap : Create PCAP file From Raw HTTP Request Or Response...

Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using it and test them against Snort...
Electronegativity

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in...

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can...
AutoRecon : Multi Threaded Network Reconnaissance Tool

AutoRecon : Multi Threaded Network Reconnaissance Tool

AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use...