Ethical Hacking is an authorized practice of bypassing system security to identify potential data breaches and threats in a network. The company that owns theRead more
Linux doesn’t have the huge popularity that Microsoft and Apple enjoy with their operating systems. But it still has a sizeable and very loyal following,Read more
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities. Supported Versions Windows 10 1507, 1511, 1607, 1703,Read more
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user’s edit rights on a Group Policy ObjectRead more
Deepfence SecretScanner can find any potential secrets in container images or file systems. What are Secrets? Secrets are any kind of sensitive or private dataRead more
ClearURLs is an add-on based on the new WebExtensions technology and is optimized for Firefox and Chrome based browsers. This extension will automatically remove trackingRead more
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx. KICS stands for Keeping InfrastructureRead more
BadOutlook is a simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a specific trigger subjectRead more
Gitrecon is a OSINT tool to get information from a Github or Gitlab profile and find user’s email addresses leaked on commits. How does thisRead more
We love to share posts on Instagram merely because we get likes, comment and shares from our friends and family members. The post with theRead more
Last year, we ran an article about ‘How to Improve Gaming Performance on Your PC’. It shared tips on everything for optimising bandwidth, to choosing theRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!