Google Hacking Database

Google Hacking Database (GHDB)

Using Google, an SQL injection on a random website can be performed within 0.2 Google seconds. Specially crafted words given as input to Google are named as dorks, …

SQL Injection

SQL Injection

Finds SQL Injection SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution. SQL …

Globe

Recon-ng v5 Tutorial

In this recon-ng v5 tutorial you will discover open source intelligence and easily pivot to new results. Find targets and move to discovering vulnerabilities. What is recon-ng? Recon-ng …

MASSCAN

MASSCAN – Mass IP port scanner

Mass IP port scanner This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a …

Commands

Command Hacking Database (CHDB)

The goal of the CHDB project is to document every binary, script, and library that can be helpful for penetration testing (Red Team). Windows Microsoft-signed (native to the …