MS-SQL and PHPMyAdmin Servers Infected with Malware Rootkit

Guardicore Labs security researchers published today a full report on the campaign of theft that attacks PHPMyAdmin and MSSQL servers over the globe. Security...

Dirhunt – Find web directory without bruteforce

Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the "index of"...

SSHD POISON : Tool to get creds of pam based sshd authentication

SSHD POISON is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can...

How to bypass Cloudflare WAF

Hey guys, I was doing Penetration testing for the private company. I am used to of manual testing instead of tools. At...

How to generate android RAT – DroidJack

DROIDJACK Jack is one of the best Android rattles with a lot of features cracked with us. Hacking and security are all about...

How to identify technologies used on websites

In this blog, I am sharing some tools name that will helps to identify which technology used on web application.

Identify and crack the Hash Hashidentity

Hash-Identity tool as per the name suggests to identifies hash and crack that entered hash value. Credit

XXE Injection Tool – XXEinjector

XXE full name is XML External Entry. XXE basically XML injection is vulnerability that occurs when a input is concatenated with XML...

Device detection script – AnchorWatch

AnchorWatch is a simple script that scans the subnet every X minutes and sends an email alert for each unknown device...

GOCA Scanner – Foca written in GO

FOCA is (Fingerprinting Organization with Collection Archives). Foca is used to find metadata and hidden information from the document. These documents may...

Latest news