top of page

SQLiv | SQL Injection

Before we are doing the injection consult, of course we must ensure that the server or target has a database security hole. To find...

TShark

Tshark, a well known and powerful command-line tool and is used as a network analyzer. It is developed by Wireshark. It’s working...

Hydra | Brute force

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy...

DNS Lookup | Python

Here you have a simple script using Python to DNS Lookup. - The sockets module provides an easy way to look up a host name's ip address....

Pin files to W10 Start Screen

Windows 10 lets you Pin folders, apps and shortcuts to executable files to the Start screen using the “Pin to Start” context menu. Using...

Linux scripts on Cisco IOS

The Cisco IOS Shell (IOS.sh) feature provides shell scripting capability to the Cisco IOS command-line-interface (CLI) environment. Cisco...

bottom of page