Homepage Linux Hunters

FEATURED POST

Porn Blocker Service: Full Guide for Restricting Adult Content.

The Internet, besides its obvious advantages, is a strange place full of dangers. Even adults often get tricked by flashy banners or disgust...

Danial Zahoor 5 Dec, 2022

Latest Posts

Extrude - Analyse binaries for missing security features, information disclosure and more.

Extrude is in the early stages of development, and currently only supports ELF and MachO binaries. PE (Windows) binaries will be supported s...

Danial Zahoor 1 Sep, 2024

ROPDump: Command-Line Tool for Analyzing ROP Gadgets, Buffer Overflows, and Memory Leaks

ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overfl...

Danial Zahoor 31 Aug, 2024

Thief Raccoon - Login Phishing Tool

Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems....

Danial Zahoor 29 Aug, 2024

Ashok is an OSINT Recon Tool, a.k.a Swiss Army knife

Incredible Fast Recon Swiss Army Knife

Danial Zahoor 28 Aug, 2024

Valid8Proxy - For Fetching, Validating, & Storing Working Proxies

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies(HTTP, HTTPS, SOCKS4, SOCKS5...

Danial Zahoor 2 Jul, 2024

Darkus - A Onion websites searcher

Darkus is a Onion websites searcher it uses deep/dark web searcher engines to search a specific word and give you back the link results.

Danial Zahoor 15 May, 2024

Urgent Warning: Beware of WhatsApp Group Scam Targeting Family and Friends

Experts are sounding the alarm on a deceptive audio call scam circulating within WhatsApp group chats, posing a significant risk to the savi...

Danial Zahoor 9 May, 2024

WP Hunter: Rapid Username and Password Brute Force Detection Tool

Wp hunter is a fastest tool to detect username of an WordPress website and you can also perform password brute forcing in login page with de...

Danial Zahoor 3 May, 2024

Brahmastra: Fortify Your Defenses with Comprehensive Cybersecurity Empowerment

Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive too...

Danial Zahoor 2 May, 2024

HidePhish: Python Script for Professional URL Masking in Phishing Attacks

FOR EDUCATIONAL PURPOSES ONLY. Usage of HidePhish for attacking targets without prior mutual consent is illegal. It's the end user's...

Danial Zahoor 1 May, 2024

BruteForce (GH05T-INSTA)

Usage of GH05T-INSTA for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all a...

Danial Zahoor 30 Apr, 2024

ToriFY: Automating Traffic Routing Through TOR with Dynamic IP and Custom MAC Address

ToriFY is a tool to Automate [anonsurf] and [macchanger] to redirect all the traffic in your device to TOR and spoof your mac address within...

Danial Zahoor 29 Apr, 2024

Tips from Your Friendly Hacker to Keep You Safe Online

In the realm of online security, the advice often comes from self-proclaimed experts. But why not take cues from a genuine hacker? In the d...

Danial Zahoor 22 Apr, 2024