Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sampleRead more
AutoHarness is a tool that automatically generates fuzzing harnesses for you. This idea stems from a concurrent problem in fuzzing codebases today: large codebases haveRead more
403bypasser automates the techniques used to circumvent access control restrictions on target pages. 403bypasser will continue to be improved and it is open to contributions.Read more
Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview in the first Speakeasy blogRead more
Please read the initial JARM blog post for more information. JARM is an active Transport Layer Security (TLS) server fingerprinting tool. JARM fingerprints can beRead more
Injects php payloads into jpeg images. Related to this post. Use Case You have a web application that runs a jpeg image through PHP’s GDRead more
Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more advanced researcher, SolitudeRead more
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once. Purpose Brute-forcing website directories or HTTP pathnameRead more
Why crack hashes when you can bust them? Features Automatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract & crack hashes fromRead more
The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of useRead more
wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes The author does not hold anyRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!