Extrude - Analyse binaries for missing security features, information disclosure and more.
Extrude is in the early stages of development, and currently only supports ELF and MachO binaries. PE (Windows) binaries will be supported s...
The Internet, besides its obvious advantages, is a strange place full of dangers. Even adults often get tricked by flashy banners or disgust...
Extrude is in the early stages of development, and currently only supports ELF and MachO binaries. PE (Windows) binaries will be supported s...
ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overfl...
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems....
Incredible Fast Recon Swiss Army Knife
Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies(HTTP, HTTPS, SOCKS4, SOCKS5...
Darkus is a Onion websites searcher it uses deep/dark web searcher engines to search a specific word and give you back the link results.
Experts are sounding the alarm on a deceptive audio call scam circulating within WhatsApp group chats, posing a significant risk to the savi...
Wp hunter is a fastest tool to detect username of an WordPress website and you can also perform password brute forcing in login page with de...
Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive too...
FOR EDUCATIONAL PURPOSES ONLY. Usage of HidePhish for attacking targets without prior mutual consent is illegal. It's the end user's...
Usage of GH05T-INSTA for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all a...
ToriFY is a tool to Automate [anonsurf] and [macchanger] to redirect all the traffic in your device to TOR and spoof your mac address within...
In the realm of online security, the advice often comes from self-proclaimed experts. But why not take cues from a genuine hacker? In the d...