Email harvesting
Email harvesting

Email harvesting is the process of obtaining lists of email addresses using various methods. We will use Metasploit to collect all target email addresses.

READ MORE
    ghost framework
ghost framework

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android […]

READ MORE
    Github: Fixing Broken Repositories
Github: Fixing Broken Repositories

Fix any broken repository of github with this method.

READ MORE
    h8mail
h8mail

h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services, or local breaches such as Troy Hunt’s “Collection1” and the infamous “Breach Compilation” torrent.

READ MORE
    Hardware Penetration Testing tools
Hardware Penetration Testing tools

Hardware Penetration Testing tools we usually use during our professional penetration testing.

READ MORE
    Kali Linux Fixing Date and Time
Kali Linux Fixing Date and Time

Kali 2020 has date time issue which can cause few applications to Not run properly in this video we are going to see how to fix date and time on […]

READ MORE
    Maltego Tutorial Part 1
Maltego Tutorial Part 1

Learn Maltego a powerful tool for gathering information and mapping information in a graphical way.

READ MORE
    Maltego Tutorial Part 2
Maltego Tutorial Part 2

Learn Maltego a powerful tool for gathering information and mapping information in a graphical way.

READ MORE
    Metasploit with Shodan
Metasploit with Shodan

Shodan is an advanced search engine that is used to search for internet connected devices such as webcams and SCADA systems. We can Combine it with Metasploit to exploit these […]

READ MORE
    Optiva-Framework
Optiva-Framework

You can use this Framework on your website to check the security of your website by finding the vulnerability in your website

READ MORE
    Pompem
Pompem

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Developed in Python, has a system of advanced search, that […]

READ MORE
    REAL WAYS TO MAKE YOUR WEBSITE INTO A BRAND
REAL WAYS TO MAKE YOUR WEBSITE INTO A BRAND

So you have created a great website and you’re proud of it now it’s a time to share this website with rest of the world so how you’re going to […]

READ MORE
    ReconCobra
ReconCobra

Reconcobra is Foot printing software for Ultimate Information Gathering. ReconCobra is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing.

READ MORE
    UserRecon v1.0
UserRecon v1.0

Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the same username on different social networks.

READ MORE
    What is RFID
What is RFID

Radio-Frequency Identification (RFID) is the modern authentication system using a RFID card or tag and a RFID authentication device. What is RFID? So let’s start with the basic question what […]

READ MORE
    WiFi Penetration Testing Tools
WiFi Penetration Testing Tools

WiFi Penetration Testing Tools used in professional Penetration Testing Environment.

READ MORE
    XSStrike
XSStrike

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.

READ MORE
    Zphisher
Zphisher

Zphisher is an Automated Phishing Tool for different types of phishing attacks.

READ MORE