SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells

SecLists is the security tester’s companion. It’s a collection of

BloodHound – Hacking Active Directory Trust Relationships

BloodHound is for hacking active directory trust relationships and it

US Government Cyber Security Still Inadequate

Surprise, surprise, surprise – an internal audit of the US

Slurp – Amazon AWS S3 Bucket Enumerator

Slurp is a blackbox/whitebox S3 bucket enumerator written in Go

Mosca – Manual Static Analysis Tool To Find Bugs

Mosca is a manual static analysis tool written in C

Nipe – Make Tor Default Gateway For Network

Nipe is a Perl script to make Tor default gateway

RandIP – Network Mapper To Find Servers

RandIP is a nim-based network mapper application that generates random

ZigDiggity – ZigBee Hacking Toolkit

ZigDiggity a ZigBee Hacking Toolkit is a Python-based IoT (Internet

Stardox – Github Stargazers Information Gathering Tool

Stardox is a Python-based GitHub stargazers information gathering tool, it

Anteater – CI/CD Security Gate Check Framework

Anteater is a CI/CD Security Gate Check Framework to prevent

HiddenWall – Create Hidden Kernel Modules

HiddenWall is a Linux kernel module generator used to create

exe2powershell – Convert EXE to BAT Files

exe2powershell is used to convert EXE to BAT files, the

Hackers Drop Spyware and Steal the Password, Credit card and Browers Data Using Telegram as a C2 Server

Researchers discovered a new trojan Masad Stealer to deliver the

US Govt. Wants The Money Edward Snowden Makes From His Memoir

The Department of Justice has filed a civil lawsuit against

How To Add Background Music To Your Instagram Story?

Over just a few years, Facebook-owned Instagram has added a

7680fps Slo-Mo Could Be Possible — Thanks To Upcoming Huawei Mate 30 Pro

Huawei is just a day away from launching its high-end

Amazon’s New HD Music Streaming Service Offers Lossless Audio Files

Amazon has launched Amazon Music HD which is a tier

Is Downloading ROMs For Emulators Illegal? Are There Some Alternatives?

Today, one cannot talk about retro-gaming without the introduction of