Tuesday, July 27, 2021
Home Tags VPN

Tag: VPN

Must Need

Instagram-Py

Instagram-Py – Python Script To Brute Force Attack

Instagram-Py is a straightforward python script to perform brute force attack against Instagram , this script can sidestep login restricting on wrong passwords ,...
OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
Intercept : Policy As Code Static Analysis Auditing

Intercept : Policy As Code Static Analysis Auditing

Intercept stupidly easy to use, small footprint Policy as Code subsecond command-line scanner that leverages the power of the fastest multi-line search...

Computer Science Extended Essays: 5 Sources to Get Writing Tips From

The success of any writing assignment is strongly dependent on its discipline. Thus, many students find computer science utterly complicated. There are many things to...
Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed locally on...

TrustJack : Yet Another PoC For Hijacking DLLs in Windows

TrustJack is a tool for yet another PoC For hijacking DLLs in windows. To be used with a...
Barq: The AWS Cloud Post Exploitation Framework

Barq: The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...