Search results

  1. D

    reconFTW

    reconFTW automates the entire process of reconnaissance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target. reconFTW uses a lot of techniques (passive, bruteforce, permutations, certificate...
  2. D

    Vulnerability | OSI model

    Vulnerability in each layer of the OSI model The OSI (Open Systems Interconnection) model is like a set of rules in a game for the components of a network communication to understand each other. This model has seven layers, each with its specific job in data transmission. Starting with the...
  3. D

    initial access in pentesting (tools)

    INITIAL ACCESS Initial access in pentesting is the first step in a security assessment, where the first vulnerability is sought and exploited to gain access to the target system. This entry point is essential for conducting thorough testing and assessing the resilience of the security...
  4. D

    Villain | backdoor

    Hi guys, I bring you a very interesting and powerful tool, I hope you find it useful, I would appreciate your support by liking the post. Villain is a backdoor generator for Windows and Linux and a multi-session driver that allows users to connect to sister servers (other machines running...
  5. D

    Access to whatsapp chat

    Hi, what viable options are there to compromise a whatsapp chat, is there any public tool that allows such a task?
  6. D

    DeepDotWeb: HANSA Market now supports 2-of-3 multi-signature

    It keeps getting better and better, thanks for the news. Now it will be possible to maintain a better flow of buying and selling, even a stable platform. Good bro
Top Bottom