How to Secure Erase Hard Drive

In this blog, I am talking about erasing your hard drive. Most of the people, When they sell Mobile, Laptop, Computer or computer parts...

Sub-domain enumeration techniques

What is Sub-domain enumeration? Sub-domain means Sub-division of domain. As a Penetration Tester most of...

Whitewidow SQL Injection scanning tool

Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potentially...

XSS fuzzer Generate XSS payloads

Xss fuzzer is a simple tool for generating xss payloads. It is mainly used in bug bounty programs. It generates XSS payloads based on user-defined...

Performing security testing of web applications Burp suit

Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. It's intended to complement...

Android Backdoor Crypter & Creator With Automatic IP Poisener – Androspy

Androspy is an open source tool for generating backdoor payload for android. It generates Crypter & Creator with Automatic IP Poisoner. Requirement for this tool keytool jarsigner ...

People Search Engine | OSINT

In this blog, I am sharing people search engine technique from Open source Intelligence. There are some open source search engine that...

XERXES DDOS tool

What is DDOS attack?DDOS attack is generating unusual traffic to the webserver. It is basically DOS (Denial of service). It means...

How to find breached Email : Whatbreach

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a list of emails...

Wps breaker | High Touch WPS Breaker

High Touch WPS Breaker is a small tool based on the bash script language. It can help you to extract the WPS...

Latest news