BugBountyToolkit - All in One Bug Bounty Tools, scanning bugs tools

BugBountyToolkit – All in One Bug Bounty Tools

To find a bug on a system pentester have to scan all the possible method to found the vulnerability with a lot of tools. All system is basically have some…

Read more »
WPrecon - Tool to Find Vulnerability in CMS Wordpress

WPrecon – Tool to Find Vulnerability in CMS WordPress

WordPress is the most use CMS for website, because there is a lot of features and easy to use. As a pentester you have to upgrade your ability to exploit…

Read more »
tempomail, tempmail logo - Generate a Custom Email Address in 1 Second and Receive Emails, Tempmail create custom email, how to create email address

Tempomail – Generate a Custom Email Address in 1 Second and Receive Emails

Email address is maybe the most important thing that human must have. Without an email then you can’t actually drive into the internet, because everything on internet is using email…

Read more »
uDork - Dorking sensitive PDF file

uDork – Advanced Google Search Techniques to Obtain Sensitive Information in Files or Directories, Find IoT Devices and More

Google dork is the most effective way to perform information gathering on web application. Search engine can do anything to help you find juicy information, but we have to understand…

Read more »
Convert exe into dll file

EXE_to_DLL – Converts an EXE to DLL File

If you already create malware with .exe format, with this tool you can concert the .exe to .dll. So, the malware loaded as DLL file. Overview Converts an EXE, so…

Read more »
URLBrute - Tool to Brute Forcing Website Sub-Domains and Directories

URLBrute – Tool to Brute Forcing Website Sub-Domains and Directories

Finding directory listing on system is very crucial, because with directory listing, maybe you can perform Local File Inclusion (LFI) attack. For sys-admin you have to check the permission on…

Read more »
What is Botnet - How Botnet Work

BSF – Botnet Simulation Framework

Botnet is become dangerous threat on internet, if your computer infect by this kind of malicious sofware, then your computer become one of attacker bot that remotely can execute some…

Read more »