Skip to content
Home
Updates
Tutorials
Web References
Pentest Collection
Recon
Public info gathering
AIO Recon Tools
Domain Enum
Subdomain Enum
Subdomain Takeover
Network Scanning
Host Scanning
Packet Scanning
Enumeration
Files
SSL/TLS
Ports
Web Attacks
General Info
Quick tricks
Header injections
Bruteforcing
Online hashes cracking tools
Crawl/Fuzz
LFI/RFI Tools
SQLi
Broken Links
Clickjacking
Cookie Padding
CORS
CRLF
CSP
CSRF
HTTP Request Smuggling
IDOR
Session fixation
SSRF
Web Cache Deception
Web Cache Poisoning
Web Sockets
XSS
XXE
Exploitation
Payloads
Reverse Shells
Post Exploitation
Linux
Windows
AD
Kerberos
Powershell tips
Pivoting
BugBounty Tips
Master assessment mindmaps
Subdomain tools review
Internal Pentest
Pentesting Web checklist
Code review
Password cracking
Burp Suite
Web Pentest
Network Pentest
Online Tools
Find my IP Address
Credentials Splitter
Online Port Scanner
Email Separator
DNS Lookup
Clickjacking POC
Reverse Tabnabbing POC
Gmail – Email Generator
Google Hacking
URL Encoder
Wayback Machine URL Scanner
Nothing Found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Latest in Cyber Security
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin
Malicious PyPI Packages Using Compiled Python Code to Bypass Detection
How Wazuh Improves IT Hygiene for Cyber Security Resilience
Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics
N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT
Active Mirai Botnet Variant Exploiting Zyxel Devices for DDoS Attacks
Urgent WordPress Update Fixes Critical Flaw in Jetpack Plugin on Million of Sites
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices
Beware of Ghost Sites: Silent Threat Lurking in Your Salesforce Communities
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
6 Steps to Effectively Threat Hunting: Safeguard Critical Assets and Fight Cybercrime
Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks
RomCom RAT Using Deceptive Web of Rogue Software Sites for Covert Attacks
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers
CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security
Implementing Risk-Based Vulnerability Discovery and Remediation
Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users