Hacking

bg
Exfilkit - Data Exfiltration Utility For Testing Detection Capabilities

Exfilkit - Data Exfiltration Utility For Testing Detection...

Data exfiltration utility for testing detection capabilities Description Data exfiltration...

bg
DOMDig - DOM XSS Scanner For Single Page Applications

DOMDig - DOM XSS Scanner For Single Page Applications

DOMDig is a DOM XSS scanner that runs inside the Chromium web browser and it can...

bg
confluencePot - Simple Honeypot For Atlassian Confluence (CVE-2022-26134)

confluencePot - Simple Honeypot For Atlassian Confluence...

ConfluencePot is a simple honeypot for the Atlassian Confluence unauthenticated...

bg
SharpEventPersist - Persistence By Writing/Reading Shellcode From Event Log

SharpEventPersist - Persistence By Writing/Reading Shellcode...

Persistence by writing/reading shellcode from Event Log. Usage The SharpEventPersist...

bg
Goreplay - Open-Source Tool For Capturing And Replaying Live HTTP Traffic Into A Test Environment In Order To Continuously Test Your System With Real Data

Goreplay - Open-Source Tool For Capturing And Replaying...

GoReplay is an open-source network monitoring tool which can record your live traffic...

bg
Gshell - A Flexible And Scalable Cross-Plaform Shell Generator Tool

Gshell - A Flexible And Scalable Cross-Plaform Shell Generator...

A simple yet flexible cross-platform shell generator tool. Name: G(Great) Shell...

bg
Ethical Hackers Help Beiersdorf Minimize Risk and Protect Their Attack Surface

Ethical Hackers Help Beiersdorf Minimize Risk and Protect...

After a year of running a private Vulnerability Disclosure Program (VDP), Beiersdorf...

bg
How Critical Infrastructure Can be Protected from Threats

How Critical Infrastructure Can be Protected from Threats

Accessing a major critical infrastructure network is very appealing to cybercriminals,...

bg
How to Catch Injection Security Vulnerabilities in Code Review

How to Catch Injection Security Vulnerabilities in Code...

Injection vulnerabilities result from insecure handling of user inputs. They are...

bg
CISOs: Do You Know the Security Risks of Your Organization's Next M&A?

CISOs: Do You Know the Security Risks of Your Organization's...

An ever-expanding attack surface is a global concern for most organizations and...

bg
FindFunc - Advanced Filtering/Finding of Functions in IDA Pro

FindFunc - Advanced Filtering/Finding of Functions in IDA...

FindFunc is an IDA Pro plugin to find code functions that contain a certain assembly...

bg
Pocsploit - A Lightweight, Flexible And Novel Open Source Poc Verification Framework

Pocsploit - A Lightweight, Flexible And Novel Open Source...

pocsploit is a lightweight, flexible and novel open source poc verification framework...

bg
Ransomware-Simulator - Ransomware Simulator Written In Golang

Ransomware-Simulator - Ransomware Simulator Written In...

The goal of this repository is to provide a simple, harmless way to check your AV's...

bg
LEAF - Linux Evidence Acquisition Framework

LEAF - Linux Evidence Acquisition Framework

Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from...

bg
Stunner - Tool To Test And Exploit STUN, TURN And TURN Over TCP Servers

Stunner - Tool To Test And Exploit STUN, TURN And TURN...

Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers. TURN...

Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.