- Web Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a Limited Timeby Priyanshu Sahay on April 20, 2020 at 6:25 AM
"Web Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a Limited Time" Peak the languages that power the web. With more high-paying web development jobs opening every day, people […]
- Smart OSINT Collection of Common IOC Typesby Priyanshu Sahay on January 31, 2020 at 9:39 AM
Smart OSINT Collection of Common IOC (Indicator of compromise) Types This application is designed to assist security analysts and researchers with the collection and assessment of common IOC types. […]
- Cybersecurity- The Beginner's Guide ($29.99 Value) FREE For a Limited Timeby Priyanshu Sahay on December 4, 2019 at 6:43 AM
"Cybersecurity: The Beginner's Guide ($29.99 Value) FREE For a Limited Time". Understand the nitty-gritty of Cybersecurity with ease It's not a secret that there is a huge talent gap in the […]
- Best Practices For Protecting Against Phishing, Ransomware and Email Fraudby Priyanshu Sahay on November 25, 2019 at 7:46 AM
"Best Practices for Protecting Against Phishing, Ransomware and Email Fraud" Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those […]
- XRay - Using For Recon Mapping And OSINT Suiteby Priyanshu Sahay on November 11, 2019 at 9:53 AM
XRay is a software for recon, mapping and OSINT gathering from public networks.XRay for network OSINT gathering, its goal is to make some of the initial tasks of information gathering and network […]
- Hacking for Dummies, 6th Edition ($29.99 Value) Freeby Priyanshu Sahay on October 14, 2019 at 2:22 PM
"Hacking for Dummies, 6th Edition ($29.99 Value) Free for a Limited Time" Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset and […]
- TraXSS - Automated XSS Vulnerability Scannerby HackersOnlineClub on October 14, 2019 at 8:28 AM
Automated Vulnerability Scanner for XSS Written in Python3 Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and […]
- Penta- Open Source All-in-one CLI To Automate Pentestingby Priyanshu Sahay on October 10, 2019 at 6:57 PM
Penta (PENTest + Automation tool) is Pentest automation tool using Python3. Installation Install requirementspenta requires the following packages. Python3.7 pipenv Resolve python package […]
- Dolos Cloak- For Network Penetration Testers To Automated 802.1x Bypassby Priyanshu Sahay on September 23, 2019 at 7:54 AM
Dolos Cloak- Automated 802.1x Bypass Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced man-in-the-middle […]
- PostShell - Post Exploitation Bind/Backconnect Shellby Priyanshu Sahay on September 10, 2019 at 6:31 AM
PostShell - Post Exploitation Bind/Backconnect Shell PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job […]
- Findomain- Fastest And Cross-platform Subdomain Enumeratorby Priyanshu Sahay on August 24, 2019 at 8:56 AM
FinDomain- Fastest And Cross-platform Subdomain Enumerator. ComparisonIt comparison gives you a idea why you should use findomain instead of another enumerators. The domain used for the test was […]
- Burp Suite Extension - To Monitor And Keep Track of Tested Endpointsby Priyanshu Sahay on August 21, 2019 at 11:45 AM
Burp Scope Monitor Extension A Burp Suite Extension to monitor and keep track of tested endpoints. Main Features Simple, easy way to keep track of unique endpoints when testing an application Mark […]
- Slurp- To Security Audits of S3 Buckets Enumeratorby Priyanshu Sahay on August 7, 2019 at 9:47 PM
Slurp- Blackbox/Whitebox S3 Bucket Enumerator To Evaluate the security of S3 buckets Overview Credit to all the vendor packages to develop Slurp possible. Slurp is for pen-testers and security […]
- PowerHub- A Post Exploitation Suite To Bypass Endpoint Protectionby Priyanshu Sahay on August 7, 2019 at 9:15 PM
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get […]
- Phantom Tap (PhanTap) - An ‘Invisible’ Network Tapby Priyanshu Sahay on August 7, 2019 at 8:47 PM
Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams. With limited physical access to a target building, this tap can be installed inline between a network device and the […]
- CloudCheck- To Test String If A Cloudflare DNS Bypass is Possibleby Priyanshu Sahay on August 2, 2019 at 5:03 PM
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before […]
- The Ultimate WinRM Shell For Penetration Testingby Priyanshu Sahay on July 31, 2019 at 12:21 PM
This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that […]
- USBRIP- Simple Command Live Forensic Tool For Tracking USB deviceby Priyanshu Sahay on July 29, 2019 at 7:18 AM
Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux. usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics […]
- MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memoryby Priyanshu Sahay on July 28, 2019 at 1:14 PM
MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory This package attempts to reduce the likelihood of sensitive data being exposed. It supports all major operating […]
- iKy OSINT Project - To Collect Information From E-Mail With GUIby Priyanshu Sahay on July 22, 2019 at 8:22 AM
iky OSINT Project. Collect information from a mail. Gather, Profile, Timeline. Project iKy is to collects information from an email and shows results in a nice visual interface.Installation Clone […]
- RedGhost - Linux Post Exploitation Frameworkby Priyanshu Sahay on July 19, 2019 at 8:30 AM
RedGhost- Linux post exploitation framework It has designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. PayloadsFunction to generate various […]
- Pyshark- To Allowing Python Packet Parsing Using Wireshark Dissectorsby Priyanshu Sahay on July 16, 2019 at 2:19 PM
Python wrapper for tshark, allowing python packet parsing using Wireshark dissectors. Pyshark features a few "Capture" objects (Live, Remote, File, InMem). Each of those files read from their […]
- Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time - eBookby Priyanshu Sahay on July 10, 2019 at 7:28 PM
"Learn Ethical Hacking from Scratch ($23 Value) FREE For a Limited Time" Learn how to hack systems like black hat hackers and secure them like security experts.This eBook will help you: Understand […]
- Seccubus- Easy Automated Vulnerability Scanning, Reporting And Analysisby Priyanshu Sahay on June 21, 2019 at 2:05 PM
Seccubus- Easy Automated Vulnerability Scanning, Reporting And Analysis Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, […]