Skip to content
Home
Updates
Tutorials
Web References
Pentest Collection
Recon
Public info gathering
AIO Recon Tools
Domain Enum
Subdomain Enum
Subdomain Takeover
Network Scanning
Host Scanning
Packet Scanning
Enumeration
Files
SSL/TLS
Ports
Web Attacks
General Info
Quick tricks
Header injections
Bruteforcing
Online hashes cracking tools
Crawl/Fuzz
LFI/RFI Tools
SQLi
Broken Links
Clickjacking
Cookie Padding
CORS
CRLF
CSP
CSRF
HTTP Request Smuggling
IDOR
Session fixation
SSRF
Web Cache Deception
Web Cache Poisoning
Web Sockets
XSS
XXE
Exploitation
Payloads
Reverse Shells
Post Exploitation
Linux
Windows
AD
Kerberos
Powershell tips
Pivoting
BugBounty Tips
Master assessment mindmaps
Subdomain tools review
Internal Pentest
Pentesting Web checklist
Code review
Password cracking
Burp Suite
Web Pentest
Network Pentest
Online Tools
Find my IP Address
Credentials Splitter
Online Port Scanner
Email Separator
DNS Lookup
Clickjacking POC
Reverse Tabnabbing POC
Gmail – Email Generator
Google Hacking
URL Encoder
Wayback Machine URL Scanner
Nothing Found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Latest in Cyber Security
New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk
New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices
LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks
Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware
Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.
Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware
New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
WhatsApp's New Secret Code Feature Lets Users Protect Private Chats with Password
U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign-Based Agents
Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious Emails
This Free Solution Provides Essential Third-Party Risk Management for SaaS
North Korea's Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks
7 Uses for Generative AI to Enhance Security Operations
CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks