Featured this week
featured
ThievingFox
Post-exploitation tools to gather credentials from various password managers and Windows utilities.
featured
Transformations
Understand how input is transformed on a system, which can help to craft payloads.
featured
WPRecon
Tool for the recognition of vulnerabilities and blackbox information for Wordpress.
featured
cook
Overpower wordlist generator, words permutation and combinations, encoding/decoding...