
-
Email harvesting
Email harvesting
Email harvesting is the process of obtaining lists of email addresses using various methods. We will use Metasploit to collect all target email addresses.
READ MORE
-
ghost framework
ghost framework
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android […]
READ MORE
-
Github: Fixing Broken Repositories
Github: Fixing Broken Repositories
Fix any broken repository of github with this method.
READ MORE
-
h8mail
h8mail
h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services, or local breaches such as Troy Hunt’s “Collection1” and the infamous “Breach Compilation” torrent.
READ MORE
-
Hardware Penetration Testing tools
Hardware Penetration Testing tools
Hardware Penetration Testing tools we usually use during our professional penetration testing.
READ MORE
-
Kali Linux Fixing Date and Time
Kali Linux Fixing Date and Time
Kali 2020 has date time issue which can cause few applications to Not run properly in this video we are going to see how to fix date and time on […]
READ MORE
-
Maltego Tutorial Part 1
Maltego Tutorial Part 1
Learn Maltego a powerful tool for gathering information and mapping information in a graphical way.
READ MORE
-
Maltego Tutorial Part 2
Maltego Tutorial Part 2
Learn Maltego a powerful tool for gathering information and mapping information in a graphical way.
READ MORE
-
Metasploit with Shodan
Metasploit with Shodan
Shodan is an advanced search engine that is used to search for internet connected devices such as webcams and SCADA systems. We can Combine it with Metasploit to exploit these […]
READ MORE
-
Optiva-Framework
Optiva-Framework
You can use this Framework on your website to check the security of your website by finding the vulnerability in your website
READ MORE
-
Pompem
Pompem
Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that […]
READ MORE
-
REAL WAYS TO MAKE YOUR WEBSITE INTO A BRAND
REAL WAYS TO MAKE YOUR WEBSITE INTO A BRAND
So you have created a great website and you’re proud of it now it’s a time to share this website with rest of the world so how you’re going to […]
READ MORE
-
ReconCobra
ReconCobra
Reconcobra is Foot printing software for Ultimate Information Gathering. ReconCobra is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing.
READ MORE
-
UserRecon v1.0
UserRecon v1.0
Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the same username on different social networks.
READ MORE
-
What is RFID
What is RFID
Radio-Frequency Identification (RFID) is the modern authentication system using a RFID card or tag and a RFID authentication device. What is RFID? So let’s start with the basic question what […]
READ MORE
-
WiFi Penetration Testing Tools
WiFi Penetration Testing Tools
WiFi Penetration Testing Tools used in professional Penetration Testing Environment.
READ MORE
-
XSStrike
XSStrike
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
READ MORE
-
Zphisher
Zphisher
Zphisher is an Automated Phishing Tool for different types of phishing attacks.
READ MORE