Sunday, June 20, 2021
Home Tags Log

Tag: Log

Must Need

Remot 3d

Remot3d – A Simple Tool Created For Large Pentesters

Remot 3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a...
Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

Quark Engine : An Obfuscation-Neglect Android Malware Scoring System

Quark Engine is an Obfuscation-Neglect Android Malware Scoring System. Android malware analysis engine is not a new story. Every antivirus company...

The Secret IG Growth Hacks You Haven’t Heard Before

The secret to Instagram success is having as many organic followers as possible. Instagram now boasts of more than one billion subscribers all over...
Kaiju : A Binary Analysis Framework Extension For The Ghidra Software Reverse Engineering Suite

Kaiju : A Binary Analysis Framework Extension For The Ghidra Software...

CERT Kaiju is a collection of binary analysis tools for Ghidra. This is a Ghidra/Java implementation of some features of the CERT Pharos Binary...

How To Improve Gaming Performance On Your PC

When it comes to playing games on your pc set up, you don’t want it to be sluggish and slow. Not only...
Quarantyne · Modern Web Firewall

Quarantyne · Modern Web Firewall

Quarantyne is a reverse-proxy that protects web applications and APIs from fraudulent behavior, misuse, bots and cyber-attacks in real-time.
Application Inspector : A Source Code Analyzer Built For Surfacing Features Of Interest

Application Inspector : A Source Code Analyzer Built For Surfacing Features...

Microsoft Application Inspector is a software source code analysis tool that helps identify and surface well-known features and other interesting characteristics of...