Learn about IsThisLegit and Phinn, two powerful open-source phishing defense tools that use machine learning algorithms. These tools help organizations defend a
Discover advanced search techniques for penetration testing using Shodan, Censys, and Google. Explore specific keywords like intext, intitle, cache, and more to
NetStalker is a free software tool that monitors all network connections on your computer, providing real-time alerts and allowing you to create custom rules fo
Discover the power of ihoneyBakFileScan for scanning website backup files. This tool helps identify and mitigate risks associated with sensitive data exposure.
Discover the advanced BrowserGhost tool on Github for extracting browser passwords. Perfect for security assessments and penetration testing. Compatible with mu
Manage your photo's exif data with Photo Exif Editor on Android. View, edit or delete exif tags to protect your privacy and enhance digital forensics. Download
Discover how ReelPhish works as a real-time phishing tool to bypass two-factor authentication. Learn about its components and successful implementation in cyber
PEframe is an open-source tool used for static analysis of malicious PE files. It helps detect packing, XOR, digital signatures, mutexes, anti-debugging techniq