Search results

  1. D

    How to insert a virus in Microsoft Office using PowerShell

    great! this is still working today? btw, I like the content, thank you
  2. D

    Finding Misconfigurations

    🔗 ScriptSentry - free https://offsec.blog/hidden-menace-how-to-identify-misconfigured-and-dangerous-logon-scripts/ 🔗ADeleginator - free https://www.linkedin.com/pulse/adeleg-active-directory-security-tool-youve-never-heard-alessi-lvqze 🔗 Locksmith - free...
  3. D

    ❄️[371] Premium Mail Access❄️

    Great, when is the data from? I hope they haven't terminated the accounts
  4. D

    LEAKEY | checks and validates filtered credentials

    LEAKEY is a tool is for validation of leaked API tokens/keys found during pentesting and Red Team Enegagments. The script is really useful for Bug Hunters inorder to validate and determine the impact of leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add...
  5. D

    Telegram Sender Pro v8.4.5.0 Full Activated Telegram Marketing

    great tool! thanks for sharing bro
  6. D

    HIJACKING CCTV CAMERAS

    wow, who would have thought that with just one dork you could achieve so much, thank you.
  7. D

    CyLR - Live Response Collection Tool

    The CyLR tool collects forensic artifacts from hosts with NTFS file systems quickly, securely and minimizes impact to the host. https://github.com/orlikoski/CyLR The main features are: Quick collection (it's really fast) Raw file collection process does not use Windows API Collection of key...
  8. D

    TInjA ↑ testing web pages for template injection vulnerabilities

    TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines for eight different programming languages. https://github.com/Hackmanit/TInjA :oops: Features Automatic detection of template injection possibilities and...
  9. D

    Exploit mitigations

    Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions. The goal is to list exploitation mitigations added over time in various operating systems, software, libraries or hardware. It becomes handy to know if a given...
  10. D

    awesome web scraping

    List of libraries, tools and APIs for web scraping and data processing. https://github.com/lorien/awesome-web-scraping Topics Python : Python packages PHP - PHP packages Ruby - Ruby packages JavaScript : JavaScript packages Web scraping manuals : list of articles and books that teach web...
  11. D

    Darkweb News Reports

    thanks for the post, accurate information, what tools do you use for reporting on the darkweb?
  12. D

    C++ tutorials for beginners codeblocks

    nice tutorial bro, thanks for sharing, it's good for those who are just starting out.
  13. D

    Infoga for OSINT, Email Address Tester

    interesting tool bro, thanks for the info 😁
  14. D

    what do you think has been the hacking that has left the biggest mark?

    In the history of computing, what do you think has been the hacking that has left the biggest mark? 🤔
  15. D

    How hackers exploit default welcome page

    nice bro, very good article, thank you. :geek:
  16. D

    How to Install Lazymux Tool for Termux

    wow all in one tool, thanks for sharing, quality member, nice bro 🙂
  17. D

    70k Botnet DDOs

    I thought it was me, but now I know the reason, thanks for the content. 👍
  18. D

    Practical Security Automation and Testing

    I find the information interesting, however I cannot access the link, it seems to be down, could you please update it, thanks in advance.
  19. D

    Malware - Worms Stealers

    interesting 🥸, let me look at it, I hope it works, thanks for share.
  20. D

    WHAT TOOLS DO I NEED AS A BEGINNER HACKER

    Hi bro, to start hacking, you first need to acquire the necessary knowledge for it. This includes learning about networking, operating systems (Linux), programming, virtual machines, etc. Once you have the basic knowledge, you can start practicing using vulnerable virtual machines. There are...
Top Bottom