This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc… Check Documentation for more...
Penta is is Pentest automation tool using Python3. (Future!) It provides advanced features such as metasploit and nexpose to extract vuln...
We all have to search through text files for strings from time to time. But what about when you need to search...
Linux and other UNIX-like operating systems have many tools for processing text on the command line. Without these tools (find complete Linux command...
QuarkslaB Dynamic binary Instrumentation (QBDI) is a modular, cross-platform and cross-architecture DBI framework. It aims to support Linux, macOS, Android, iOS and...
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim’s machine, a controler, running on any machine,...
Short Bytes: Linux distributions can leverage an extensive range of commands to accomplish various tasks. For most Linux distros, Bash (bourne again...
Short Bytes: Command output, and input, can be controlled in extremely flexible ways using pipes and redirection. This is much more than...
Last time we discussed the Linux Directory Structure and the roles of the various directories that form a part of the Linux...