Facebook
Instagram
Twitter
Youtube
Sign in
KaliLinux
Tech today
Android
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Kali Linux Tutorials
KaliLinux
Tech today
Applications
Mininterface : Simplifying GUI, TUI, CLI, And Config File Management
Applications
GPT Crawler : A Tool For Custom GPT Creation
Hacking Tools
CPUMicrocodes : A Gateway To Advanced CPU Microcode Management And Optimization
Hacking Tools
EUD : Exploring Qualcomm’s Embedded USB Debugger
software
Unleashed Recompiled : A Technical Deep Dive Into Sonic’s PC Transformation
All
Android
Apple
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Apple
MLX-VLM : A Comprehensive Tool For Vision Language Models On Mac
Geeks
Linux
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Kali Linux Tools
Delta : A Powerful Syntax-Highlighting Pager For Git And Command-Line Workflows
Applications
Applications
Mininterface : Simplifying GUI, TUI, CLI, And Config File Management
Applications
GPT Crawler : A Tool For Custom GPT Creation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Applications
NSSM : Essential Guide To Non-Sucking Service Manager For Windows Services
Applications
Pake : Transforming Webpages Into Desktop Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Home
Tags
Informationsecurity
Tag: informationsecurity
Pentesting Tools
enum4linux-ng : The Next-Generation Tool For Windows And Samba Enumeration
Varshini
-
September 24, 2024
0
Exploitation Tools
Interactive PDF Analysis – A Deep Dive Into Secure PDF Examination
Varshini
-
September 24, 2024
0
Cyber security
zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With...
Varshini
-
September 24, 2024
0
Hacking Tools
ConfuserEx2 String Decryptor – A Guide To Deobfuscating .NET Applications
Varshini
-
September 23, 2024
0
Post Exploitation
GlobalUnProtect – Decrypting And Harvesting Sensitive Data From GlobalProtect Installations
Varshini
-
September 23, 2024
0
Cyber security
Capa v7.3.0 – Enhanced Malware Analysis With VMRay Integration, Ghidra Support,...
Varshini
-
September 23, 2024
0
Cyber security
MSSprinkler – Enhancing M365 Security Through Advanced Password Testing
Varshini
-
September 23, 2024
0
Cyber security
Inception – A Deep Dive Into PCI-Based DMA Memory Hacking
Varshini
-
September 23, 2024
0
Exploitation Tools
NyxInvoke – A Comprehensive Guide To Advanced Execution Techniques In Rust
Varshini
-
September 20, 2024
0
Tutorials
Learn Rust, One Exercise At A Time
Varshini
-
September 20, 2024
0
1
...
37
38
39
...
117
Page 38 of 117
APPLICATIONS
Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes
R K
-
March 4, 2022
Awesome GDPR – Empowering Privacy through Comprehensive Compliance And Innovation
Varshini
-
March 22, 2024
T1036.005 – Masquerading : Match Legitimate Name Or Location
Varshini
-
April 12, 2024
Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters
R K
-
January 28, 2019
HOT NEWS
BlueSpy – PoC To Record Audio From A Bluetooth Device
Varshini
-
March 27, 2024
0
Cyber security
This repository contains the implementation of a proof of concept to record and replay audio from a bluetooth device without the legitimate user's awareness. The...