Tor - Tor proxy/network services
Tor is a python based module for using tor proxy/network services on windows, osx, linux with just one click.
The Internet, besides its obvious advantages, is a strange place full of dangers. Even adults often get tricked by flashy banners or disgust...
Tor is a python based module for using tor proxy/network services on windows, osx, linux with just one click.
Based on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of JuicyPotatoNG, I discovere...
Simple script to generate graphs and charts on hashcat (and john) potfile and ntds.
TLDHunt is a command-line tool designed to help users find available domain names for their online projects or businesses. By providing a ke...
Are you passionate about supporting cybersecurity education and want to contribute to our laptop donation initiative? We're excited to a...
A simple script just made for self use for bypassing 403 It can also be used to compare responses on verious conditions as shown in the belo...
🚨 Don't be an easy target for scammers! Stay vigilant and keep your personal information safe with these simple tips to avoid falling ...
The impact of AI on humanity is a complex and debated topic. Like any powerful technology, AI has the potential to be both beneficial and ...
This is a Baileys based piece of code that lets you tunnel TCP data through two Whatsapp accounts.
QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security of...
SilentMoonwalk is a PoC implementation of a fully dynamic call stack spoofer, implementing a technique to remove the original caller from th...
The debate surrounding gun ownership and its impact on household safety has long been a contentious issue in modern society. While some argu...
The fear of failure is a common experience that we all face at some point in our lives. Whether it’s a fear of not achieving our goals, disa...
Analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
Cloud Exploit Framework Photo by KitExploit