Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
This project is heavily work in progress and is being created as a study for me and new reversers in .NET VM to explore and learn about code obfuscation techniques and how to reverse engineer them.
The main focus currently of this project is on .NET Reactor 6.9.0.0, which has a simple 1:1 CIL...
This tool, called "ThreatHound," is a powerful and versatile tool written in Python (with a new C version available for Linux-based systems) that helps with IR & Threat Hunting & CA. With ThreatHound, you can drop your event log file and analyze the results easily. It now supports...
DNSRecon is a Python-based tool for DNS scanning and enumeration. It offers various functionalities, including enumerating standard records (A, NS, SOA, and MX) for a specified domain and expanding top-level domains for a given domain.
The tool comes with a user-friendly, graph-oriented...
Whoami is a user-friendly privacy and anonymity tool designed to provide a high level of security through its simple interface and easy-to-use features. The tool uses over 9 modules to ensure maximum anonymity and also comes equipped with a Bug fixer module that is currently under development to...
Tool Ghost KMS is a tool that has made the interaction between the user and the activation system easier and clearer. Using the «Events» panel, which lists each step that occurs when using any of the options that you can see in small icons or words that, when clicked, perform a specific task...
BlackStone project or “BlackStone Project” is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting.
In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal...
Hidden content
Download Rank Math Pro - WordPress SEO Made Easy Nulled Free Premium Plugin
Rank Math is the most powerful way to get BEST WordPress SEO tools added to your website.
-Extra Benefits
-Exclusive Facebook Club
-Fastest SEO Plugin
-SEO & Schema on Automation
-Advanced...
SMM Matrix is a social media marketing tool. This software includes almost everything for you need to do a social media marketing business. It has services lined up for every social media platform and hence is a very versatile platform. Be it likes, followers, views, or even general engagement...
What is an DosS tool?
Well DoS tools used to do packet attacks on targeted ip/server/link with alot of package requests. Our DosS tool is pretty nice to Attack on a website , easy and clear Appereance!.
Tool:
Made by SqLoSt
Current version is 2.1v ( please remove old version while...
Educational purposes only
This script is owned by SqLoSt (as an developer and copyright owner) , you are free to share , modify and use this code but only for educational purposes any damage/threatment happend via script isn't developer's problem. using script for doxxing is forbidden.
About...
The Infection Monkey is an open-source security tool for testing a data center’s resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self-propagate across a data center and reports success to a centralized Command and Control(C&C) server.
Main...
APT-Hunter is a Threat Hunting tool for windows event logs which made by the purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity. This tool will make good use of the windows event logs collected and make...
Condor is a tool created to help pentesters bypass protections like AVs/EDRs/XDRs in the Windows operating system. Condor was developed in Python and has several advantages to help pentesters.
Benefits
Easy to use
Bypass multiple AVs/EDRs/XDRs
Two XOR encryption process and an...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.