Frogy2.0 - An Automated External Reconnaissance And Attack Surface Management (ASM) Toolkit
Reviewed by Zion3R
on
9:42
Rating:
Featured Post
Curing: Un Rootkit Basado En Io_Uring Deja “Ciegas” A Muchas Soluciones De Seguridad En Linux
Reviewed by Zion3R
on
5:37
Rating: 5

Hackén 2025: La CON De Hacking En Jaén El 30 Y 31 De Mayo
Reviewed by Zion3R
on
1:17
Rating: 5

Advertisement
PEGASUS-NEO - A Comprehensive Penetration Testing Framework Designed For Security Professionals And Ethical Hackers. It Combines Multiple Security Tools And Custom Modules For Reconnaissance, Exploitation, Wireless Attacks, Web Hacking, And More
Reviewed by Zion3R
on
9:55
Rating: 5

Hacking Home Devices II: PoCs & Hack Just For Fun! Aprende Cómo Buscar Bugs En Los Dispositivos De Tu Casa
Reviewed by Zion3R
on
1:15
Rating: 5

Text4Shell-Exploit - A Custom Python-based Proof-Of-Concept (PoC) Exploit Targeting Text4Shell (CVE-2022-42889), A Critical Remote Code Execution Vulnerability In Apache Commons Text Versions < 1.10
Reviewed by Zion3R
on
10:18
Rating: 5

Advertisement
Ghost-Route - Ghost Route Detects If A Next JS Site Is Vulnerable To The Corrupt Middleware Bypass Bug (CVE-2025-29927)
Reviewed by Zion3R
on
8:35
Rating: 5
BootCamp "Especialista En Ciberseguridad" Con Garantía De Empleo Y Becas: Comienzo 5 De Mayo
Reviewed by Zion3R
on
5:59
Rating: 5

Bytesrevealer - Online Reverse Enginerring Viewer
Reviewed by Zion3R
on
9:05
Rating: 5

Suscribirse a:
Entradas (Atom)