"Web Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a Limited Time" Peak the languages that power t... Read more »
Web Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a Limited Time
"Web Coding And Development All-in-One For Dummies ($25.99 Value) FREE for a Limited Time" Peak the languages that power t... Read more »
Smart OSINT Collection of Common IOC (Indicator of compromise) Types This application is designed to assist security analysts and res... Read more »
"Cybersecurity: The Beginner's Guide ($29.99 Value) FREE For a Limited Time". Understand the nitty-gritty of Cybersec... Read more »
"Best Practices for Protecting Against Phishing, Ransomware and Email Fraud" Osterman Research conducted a survey among ... Read more »
XRay is a software for recon, mapping and OSINT gathering from public networks. XRay for network OSINT gathering, its goal is to make ... Read more »
"Hacking for Dummies, 6th Edition ($29.99 Value) Free for a Limited Time" Stop hackers before they hack you! In order to ... Read more »
Automated Vulnerability Scanner for XSS Written in Python3 Traxss is an automated framework to scan URLs and webpages for XSS Vu... Read more »
Penta (PENTest + Automation tool) is Pentest automation tool using Python3. Installation Install requirements penta requires the f... Read more »
Dolos Cloak- Automated 802.1x Bypass Dolos Cloak is a python script designed to help network penetration testers and red teamers byp... Read more »
PostShell - Post Exploitation Bind/Backconnect Shell PostShell is a post-exploitation shell that includes both a bind and a back con... Read more »
FinDomain- Fastest And Cross-platform Subdomain Enumerator. Comparison It comparison gives you a idea why you should use findomain in... Read more »
Burp Scope Monitor Extension A Burp Suite Extension to monitor and keep track of tested endpoints. Main Features Simple, easy ... Read more »
Slurp- Blackbox/Whitebox S3 Bucket Enumerator To Evaluate the security of S3 buckets Overview Credit to all the vendor package... Read more »
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection PowerHub is a convenient post exploitation tool which aids a pent... Read more »
Phantom Tap (PhanTap) - An ‘Invisible’ Network Tap Aimed at Red Teams. With limited physical access to a target building, this tap... Read more »