Tracgram : Use Instagram location features to track an account
Trackgram Use Instagram location features to track an account. Usage Installation steps Screenshots Features
More results...
Trackgram Use Instagram location features to track an account. Usage Installation steps Screenshots Features
Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a room when you need to launch amass, subfinder, sublister, or any other tool to find subdomains you can use to break through – like test.google.com, dev.admin.paypal.com or […]
OffSec released the 2023 edition of Penetration Testing with Kali Linux (PEN-200). This new version, which incorporates the latest ethical hacking tools and techniques through real-world penetration testing simulations, offers many improvements and add…
Offensive security released Kali Linux 2023.1 with new tools for purple and blue teamers for defensive security. On March 13th Kali Linux penetration distro completed 10 years of providing amazing services to the cyber security community. On celebratin…
OffSec (formerly Offensive Security) has released Kali Linux 2023.1, the latest version of its popular penetration testing and digital forensics platform, and the release is accompanied by a big surprise: a technical preview of Kali Purple, a “on…
Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP refers to the process of looking up all the domain names that are hosted on a particular IP address. This can be useful for a variety of reasons, such as identifying all the websites that […]
ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the results. New Release Features: $ ThreatHound.exe -s ..\sigma_rules\ -p C:\Windows\System32\winevt\Logs\ -print no I’ve built the following: Features of the tool: To-do: installiton: $ git clone https://github.com/MazX0p/ThreatHound.git $ cd ThreatHound $ pip […]
Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you may focus on discovering vulnerabilities while we help you with the rest. Just use it in your terminal and get your work organized on the run. Faraday was made to let […]
Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: Installation: Usage: upload_bypass.py [options] Options: -h, –help -u URL, –url=URL -s , –success -e , –extension -a , –allowed -H , –header -l , –location -S, –ssl -p, –proxy -c, –continue -v, –verbose -U , –username -P , –password
OffensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team exercises.A common use of OffensivePipeline is to download a tool from a Git repository, randomise certain values in the project, build it, obfuscate the resulting binary and generate a shellcode. Features What’s new in […]