Featured Post

AirStrike - Automatically Grab And Crack WPA-2 Handshakes With Distributed Client-Server Architecture AirStrike - Automatically Grab And Crack WPA-2 Handshakes With Distributed Client-Server Architecture Reviewed by Zion3R on 8:30 AM Rating: 5
IAM Vulnerable - Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground IAM Vulnerable - Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground Reviewed by Zion3R on 5:30 PM Rating: 5
DLLHijackingScanner - This Is A PoC For Bypassing UAC Using DLL Hijacking And Abusing The "Trusted Directories" Verification DLLHijackingScanner - This Is A PoC For Bypassing UAC Using DLL Hijacking And Abusing The "Trusted Directories" Verification Reviewed by Zion3R on 8:30 AM Rating: 5
Advertisement
IDA2Obj - Static Binary Instrumentation IDA2Obj - Static Binary Instrumentation Reviewed by Zion3R on 5:30 PM Rating: 5
ClusterFuzzLite - Simple Continuous Fuzzing That Runs In CI ClusterFuzzLite - Simple Continuous Fuzzing That Runs In CI Reviewed by Zion3R on 8:30 AM Rating: 5
Crawpy - Yet Another Content Discovery Tool Crawpy - Yet Another Content Discovery Tool Reviewed by Zion3R on 5:30 PM Rating: 5
Advertisement
Kerberoast - Kerberoast Attack -Pure Python- Kerberoast - Kerberoast Attack -Pure Python- Reviewed by Zion3R on 8:30 AM Rating: 5
ShonyDanza - A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan ShonyDanza - A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan Reviewed by Zion3R on 5:30 PM Rating: 5
XC - A Small Reverse Shell For Linux And Windows XC - A Small Reverse Shell For Linux And Windows Reviewed by Zion3R on 8:30 AM Rating: 5