Wednesday, 2 July 2025
  • Privacy Policy
  • Contact Us
  • My account
    • Checkout
    • Cart
James Eduard
  • Home
  • How To’s
  • Microsoft
    • Microsoft 365
    • Microsoft Defender
    • Microsoft Intune
    • Microsoft Entra
    • Microsoft Sentinel
    • Azure AD
  • Linux
    • CentOS
    • Debian
    • ElementaryOS
    • Fedora
    • Kali Linux
    • FreeBSD
    • Linuxmint
    • Redhat
    • RHEL
    • Open Suse
    • Ubuntu
  • MacOS
  • Cloud
    • VMWare
    • Azure
    • AWS
    • Cloudflare
    • DevOps
      • Dynatrace
      • Terraform
      • Docker
  • Security
    • Capture the Flag
      • HackTheBox
    • Hardware Hacking
    • Forensics Tools
    • Hacker Conference
    • InfoSec
    • Exploit

Breaking News

  • XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation 10 years ago
  • REMnux – A Linux Toolkit for Reverse-Engineering and Analyzing Malware 10 years ago
  • SPF – SpeedPhish Framework 10 years ago
  • Facebook CTF is Now Open Source! 9 years ago
  • BruteX – Automatically Brute Force all services running on a Target 10 years ago
  • How to Patch VENOM Vulnerability [CVE-2015-3456] on Linux 10 years ago

Vulnerability Scanner

Hashcatch – Capture Handshakes Of Nearby WiFi Networks Automatically

Hashcatch – Capture Handshakes Of Nearby WiFi Networks Automatically

August 31, 2019 0 Comment

[vc_row][vc_column][vc_column_text]Hashcatch deauthenticates clients connected to all nearby WiFi networks and tries to capture the handshakes. It can be used in…

jSQL Injection is a Java application for automatic SQL database injection.

April 7, 2018 0 Comment

jSQL Injection is a lightweight application used to find database information from a distant server. It is free, open source…

iCloudBrutter -AppleID Bruteforce Attack

March 27, 2018 0 Comment

iCloudBrutter is a simple python (3.x) script to perform basic bruteforce attack againts AppleID. Usage of iCloudBrutter for attacking targets…

XSStrike v2.0 – An Advanced XSS Detection And Exploitation Suit

March 27, 2018 0 Comment

XSStrike is an advanced XSS detection suite. It has a powerful fuzzing engine and provides zero false positive result using…

CVE-2017-17411: Linksys WVBR0 25 Command Injection

December 26, 2017 0 Comment

Recently a security researcher Ricky Lawshae from Trend Micro discover a critical vulnerability on Linksys Wireless Bridge WVBR0-25 this allows…

Acunetix Free Manual Pen Testing Tools

January 13, 2017 0 Comment

Acunetix Manual Tools allow penetration testers to further automated testing. Scan your websites SQL Injection & Blind SQL Injection Cross-site…

VBScan 0.1.7 – Black Box vBulletin Vulnerability Scanner

October 23, 2016 0 Comment

OWASP VBScan OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin…

D-TECT – Pentesting the Modern Web

August 27, 2016 0 Comment

D-TECT is an All-In-One Tool for Penetration Testing. This is specially programmed for Penetration Testers and Security Researchers to make…

Shadowd – The Shadow Daemon Web Application Firewall Server

June 17, 2016 0 Comment

Shadow Daemon is a collection of tools to detect, record and prevent attacks on web applications. Technically speaking, Shadow Daemon…

XssPy – Web Application XSS Scanner

June 13, 2016 0 Comment

XssPy is a python tool for finding Cross Site Scripting vulnerabilities in websites. This tool is the first of its…

Posts pagination

1 2 Next
  • LinkedIn
  • Twitter
  • Facebook
  • RSS Feed

HackTheBox Badge

HTB Badge
Klook.com Klook.com

Recent Posts

  • Introducing Quick Machine Recovery: Microsoft’s Solution to Driver-Induced Blue Screens
  • DevToys: The Ultimate Swiss Army Knife for Developers and Security Analysts
  • How to Renew the Apple MDM Push Certificate
  • How to Create a New Apple ID for MDM – A Step-by-Step Guide
  • How to Install PowerShell on Windows, Linux, and macOS

Categories

  • Azure
  • DevOps
  • Docker
  • How To’s
  • Linux
  • Malware
  • Network Security
  • Powershell
  • Security







Klook.com
Follow on LinkedIn

© Copyright 2011 James Eduard