SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods would be relayingRead more
Smersh is a pentest oriented collaborative tool used to track the progress of your company’s missions and generate rapport. Preview Front Documentation All information isRead more
Databases have been used by various organizations to solve business problems for a very long time. In the early days, databases used to be flatRead more
Data security is a big deal. Lapses in data security aren’t just a minor mistake; they can violate regulatory compliance rules, fail to protect customersRead more
Webstor is a tool implemented in Python under the MIT license for quickly enumerating all websites across all of your organization’s networks, storing their responses,Read more
Data protection is highly important in 2022 to avoid becoming a victim of online scams, losing any stored data, and prevent others from stealing yourRead more
QueenSono tool only relies on the fact that ICMP protocol isn’t monitored. It is quite common. It could also been used within a system withRead more
SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) in a way that doesn’t affect or break the existing authenticodeRead more
Fpicker is a Frida-based fuzzing suite that offers a variety of fuzzing modes for in-process fuzzing, such as an AFL++ mode or a passive tracingRead more
A VPN (Virtual Portal Network) is a tool that allows you to use the internet securely. It does this by creating an encrypted tunnel betweenRead more
The most popular penetration testing distro Kali linux announced a new version that included extended support for OpenSSL, new Tools, Live VM Support, and supportRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!