JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication …
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication …
Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device …
WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results …
Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to …
Fluxion repack of LINSET with minor bugs and with added features. It’s compatible with latest Kali Linux, Rolling …
Thanks to the ridiculous valuation of Bitcoin and other cryptocurrencies, cryptomining code has become a common mechanism for converting …
We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Security researcher Scott Helme …
I have to admit, with a high degree of shame, that I didn’t know about the OWASP dependency check maven plugin. And seems to have been …
At the beginning of any coder’s career, they build queries in code using strings. When you build strings in your code instead of on the …
KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose particular or all …
Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also …
Last summer I started learning about information security and hacking. Over the last year I’ve played in various wargames, capture the …
The objective of this Information Gathering tool is to extract Linkedin users based on the organization, job description or email …
DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting its resources. What is DDOS …