InviZible Pro – Android application for Internet privacy and security

InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the...

Bypassing the CloudFlare and finding the server

Learn to bypass CloudFlare and find the server using the CloudFlair tool. Follow us on this hacking and security training. Search the server and...

Sherlock – Find Usernames Across Social Networks

Find user name across 140+ social network. Requirment install python3 and python3-pip if not exist How to install # clone the repo $ git clone https://github.com/sherlock-project/sherlock.git # change...

Top 10 Browser Extensions for OSINT Researchers

For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for...

Dex to Java Decompiler : JADX

jadx - Dex to Java decompiler Command line and GUI tools for produce Java source code from Android Dex and Apk files. Android application package...

How to find breached Email : Whatbreach

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a list of emails...

BlackBox operating system

Introducing one of the best security penetration testing platforms in the name of BlackBox, suitable for security professionals for free, with our continuing hacking...

PhoneInfoGa: Reconnaissance tool for phone numbers

PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather standard information...

Whitewidow SQL Injection scanning tool

Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potentially...

File Password Recovery Tool : ZYDRA

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords....

Latest news