Google Dorks
Google helps you with Google Dorks to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Google SQL dorks. More than a million of people searching for google dorks for various purposes for database queries, SEO and for SQL injection. SQL injection is a technique which attacker takes non-validated input...
registryw
The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it holds. Today most administrators and forensic analysts, the registry probably looks like the entrance to a dark. Besides Configuration information,  the Windows Registry holds information regarding recently accessed files and considerable information about user activities.
tech giants
A new shocking report reveals eight of the world’s biggest technology service giants hacked by the Chinese Government Sponsored Hackers since 2014. Suspected hacking attempts are initiated by a team of hackers who resides in China against major well know tech giants including Fujitsu, Tata Consultancy Services, NTT Data, Dimension Data, Computer Sciences Corporation,...
iky
Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Visit the Gitlab Page of the Project Project - Previous version We want to warn you that we have changed the Frontend from AngularJS to Angular 7. For this...
Cryptr
Installation git clone https://github.com/nodesocket/cryptr.git ln -s "$PWD"/cryptr/cryptr.bash /usr/local/bin/cryptr Bash tab completion Add tools/cryptr-bash-completion.bash to your tab completion file directory. API/Commands encrypt encrypt <file> - Encryptes file with OpenSSL AES-256 cipher block chaining. Writes an encrypted file out (ciphertext)appending .aes extension.
vulnx
Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like subdomains, ipaddresses, country, org, timezone, region, ans and more ... Instead of injecting each and every shell manually like all the other tools do, VulnX analyses the target website checking...
Linux Post Exploitation Framework
Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.  Payloads Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perllsWrapper Function to wrap the "ls" command with payload to run payload everytime "ls" is run for persistenceCrontab Function to create cron...
One-Lin3r
One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows, Linux, macOS or even BSD systems) or hacking generally with a lot of new features to make all of this fully automated (ex: you won't even need to copy the one-liners). Screenshots for version...
Telegram Bot
Telegram Bot (and hopefully soon Client) API framework for Crystal. Based heavily off of Telegraf this Crystal implementation allows your Telegram bot to be written in a language that's both beautiful and fast. Benchmarks coming soon. If you want to extend your bot by using NLP, see my other library Cadmium. Installation
harmless virus
The harmless virus works as follows: 1. Open notepad and copy the code given below: Set oWMP = CreateObject(“WMPlayer.OCX.7”)Set colCDROMs = oWMP.cdromCollectiondoif colCDROMs.Count >= 1 thenFor i = 0 to colCDROMs.Count – 1colCDROMs.Item(i).EjectNextFor i = 0 to colCDROMs.Count – 1colCDROMs.Item(i).EjectNextEnd Ifwscript.sleep 5000loop 2. Save the file with...