Freelearningtech
727 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
Forwarded from Network Slutter โ„ข ๐Ÿฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter โ„ข ๐Ÿฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter โ„ข ๐Ÿฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒCHINESE COULD HACK DATA FOR FUTURE QUANTUM DECRYPTION,REPORT WARNS

๐ŸŒAPPLE SAYS IT WILL NOTIFY USERS WHOSE IPHONES WERE HACKED BY SPYWARE

๐ŸŒPANASONIC CONFIRMS DATA BREACH AFTER HACKERS ACCESS INTERNAL NETWORK

๐ŸŒAUSTRALIAN LAW ENABLES STATE-AUTHORISED HACKING AND SURVEILLANCE

๐ŸŒMICROSOFT WINDOWS 10 AND 11 USERS WARNED TO URGENTLY UPDATE SOFTWARE NOW AS HACKERS EXPLOIT NEW MALWARE

๐ŸŒMUSK'S STARLINK STOPS PRE-BOOKING IN INDIA

๐ŸŒVULNERABILITY REPORTED ON CDSL VENTURES WEBSITE RESOLVED NOW :MOS FINANCE

๐ŸŒRUSSIA FINES GOOGLE 3 MILLION ROUBLES FOR NOT DELETING BANNED CONTENT

๐ŸŒRELIANCE JIO PREPARING JIO TV AND A JIO TABLET FOR THE INDIAN MARKET TO BE RELEASED IN 2022

๐ŸŒRUSSIA SAYS TWITTER MOBILE SLOWDOWN TO REMAIN UNTIL ALL BANNED CONTENT IS REMOVED

๐ŸŒJACK DORSEY STEPS DOWN AS TWITTER CEO, PARAG AGARWAL TO REPLACE HIM

๐ŸŒMETA'S ACQUISITION OF GIPHY SET TO BE BLOCKED BY UK REGULATOR


DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW770lVl1Xg/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficials Cybe Crime Laws in India 3 (1).pdf
41.4 KB
CYBER CRIME LAWS IN INDIA

Credits -
@cybermonkeyofficials

{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}

โœObservations on ITA AND ITAA
โœAWARENESS
โœJURISDICTION
โœEVIDENCES
โœNON COVERAGE OF COMPUTER CRIMES
โœ PREVENTION OF MONEY LAUNDERING
โœE-RECORDS MAINTENANCE POLICY FOR BANKS
โœLEGISLATION IN OTHER NATIONS
โœCONCLUSION

Previous Notes are Uploaded in -

https://t.me/backupcybermonkeyofficials

INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
https://drive.google.com/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU

โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ

Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒAIRTEL HOLD'S INDIA'S FIRST 5G TRIAL IN 700 MHZ BAND WITH NOKIA

๐ŸŒVIRTUAL LAND SELLS FOR 32 CRORE IN MOST EXPENSIVE 'METAVERSA' PROPERTY SALE

๐ŸŒCHINA PLANS TO BAN LOOPHOLE USED BY TECH FIRMS FOR FOREIGN IPOs

๐ŸŒOVER 9000 COMPLAINTS OF CYBERFRAUDS RECEIVED ON NATIONAL CONSUMER HELPLINE IN FY21

๐ŸŒQUALCOMM, GOOGLE CLOUD COLLABORATE TO CREATE NEXT GEN MOBILE AI

๐ŸŒDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACKDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACK

๐ŸŒMICROSOFT EXCHANGE SERVERS HACKED TO DEPLOY BLACKBYTE RANSOMWARE

๐ŸŒTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEBTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEB

๐ŸŒSAUDI ARABIA SHOWCASES ITS TECH AMBITIONS AS
@HACK NAMED 'LARGEST CYBERSECURITY EVENT OF 2021'

๐ŸŒDEFI HACK:$31 MILLION STOLEN FROM MonoX PLATFORM ON POLYGON AND ETHEREUM

๐ŸŒNEW CYBER CRIME POLICE STATIONS TO START FUNCTIONING IN EACH POLICE DISTRICT IN DELHI FROM 30 NOV 2021

DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficial Forensic Science (1).pdf
90.2 KB
FORENSIC SCIENCE

Credits - @cybermonkeyofficials

{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}

โœBALLISTICS AND FIREARMS
โœHOW BALLISTICS HELP IN CRIME DETECTION
IDENTIFYING A WEAPON
INVESTIGATING
โœSIX REMARKABLE WAYS GUNS CAN BE LINKED TO CRIME SCENE
โœTHE FIREARM
โœFIREARM EVIDENCES THAT MAY BE FOUND
โœ HOW SAMPLES ARE COLLECTED
โœSOURCES CARRYING FIREARM EVIDENCES
โœ BULLETS
โœIDENTIFICATION AND EVALUATION
โœCASE STUDIES

Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials

INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
*Want to Learn/Start With Ethical Hacking...?* ๐Ÿค”

_Don't Worry ๐Ÿ˜‰๐Ÿ˜Œ_

*CYBRITEX SECURITY is Introducing....*
*_The Hacker's Path_* Training Course To Start with _Ethical Hacking & More..._
This Training Course will be provide you :-
*โ€ข Live Classes*
*โ€ข Hands on Practice*
*โ€ข Clearance of Doubts &*
*โ€ข A skill Certification*

So, What are you Waiting for...? ๐Ÿคท๐Ÿปโ€โ™‚๏ธ
Don't miss this opportunity and get Enrolled Now...๐Ÿ‘‡๐Ÿป

*What our Students Says ?* ๐Ÿ˜ƒ
โ€ข> https://cybritex.com/index.php/courses/

Demo Video-- https://share.vidyard.com/watch/wpfAGEZd8Kpu2G6TT9Fd9t?

*Registration Link:-* rzp.io/l/ZFlmPE0p4G

For More Information *Contact Us* here :- https://wa.me/+919728577879

_P.S - Forward and help your friends, if you are not interested..._
Forwarded from netslutter โ„ข (Rล“t)
Please open Telegram to view this post
VIEW IN TELEGRAM
FROM INTERNET

1)Easy SQLi in Amazon subsidiary using Sqlmap
https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b

2)Bypass File Upload Restrictions
How to Get a Shell on a Website using a File [Tutorial]
https://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb

3)Cross-site request forgery (CSRF)
https://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded

4)How to Exploit Public Firebase Realtime Database using REST API
https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55

5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal
https://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/

6)Awesome PostgreSQL
https://reconshell.com/awesome-postgresql/

7)Web cache poisoning bug discovered in Symfony PHP framework
https://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework

8)Artificial Intelligence
https://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf

9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)
https://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&utm_medium=email&utm_source=Revue%20newsletter

:OSCP EXAM:
1)OSCP Exam Change
https://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&utm_medium=social&utm_source=facebook&hss_channel=fbp-132187200151961
2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
https://www.youtube.com/watch?v=uvqdSGlwEkA
bounty_tips_100+.pdf
18.3 MB
All about OSCP

Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.


OSCP Buffer overflow concepts and tutorials
http://strongcourage.github.io/2020/04/19/bof.html

OSCP Cheatsheets:)
https://github.com/slyth11907/Cheatsheets

Pentest-Cheat-Sheets

This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.

Link:-https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets

Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/

All about OSCP:-
https://oscp.infosecsanyam.in/

OSCP preparation
https://github.com/rewardone/OSCPRepo

https://github.com/0x4D31/awesome-oscp#resources
https://ired.team/offensive-security-experiments/

OSCP methodology:-
https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q

https://github.com/OlivierLaflamme/Cheatsheet-God

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

https://github.com/foobarto/redteam-notebook/blob/master/README.md

https://github.com/RustyShackleford221/OSCP-Prep

https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/


Share With OSCP Learners ๐Ÿ™๐Ÿป


โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ

Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
๐ŸŽฒWhat Is RansomWare ? ๐ŸŽฒ

Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key

๐ŸงธThere Are Two Types Of Ransomware In Circulation :-

๐ŸŒปEncrypting Ransomware

Which Incorporates Advanced Encryption Algorithms.

It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content

๐ŸƒExamples :- CryptoLocker, Locky CryptoWall And More

๐ŸŒป Locker Ransomware

Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.

โŠฐแฏฝโŠฑโ”ˆโ”€โ”€โ•ŒโŠโ•Œโ”€โ”€โ”ˆโŠฐแฏฝโŠฑ

Top 3 Biggest Ransomware Attacks In The Histroy :-

1.WannaCry ( Encrypting Ransomware )

2 .Tesla Crypt

3. Not Petya ( Locker Ransomware)
Worm virus creation tools๐Ÿ›๐Ÿ›๐Ÿ›๐Ÿ›

Don't use at host machine use on virtual machine

Rar password in breakets

https://drive.google.com/file/d/13NTSxMS8Ov0o7PasaL3aNQ-apnjk6sfy/view?usp=drivesdk

https://drive.google.com/file/d/1GRBUtBkjyFcDVaJTpLXPXJ8PaMNozZ6t/view?usp=drivesdk

โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ

Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
๐Ÿ‘1
Forwarded from netslutter โ„ข (Rล“t)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒAMAZON TO SHUT DOWN WEBSITE RANKING SITE 
ALEXA.COM IN MAY 2022

๐ŸŒWHATSAPP LAUNCHES CRYPTOCURRENCY PAYMENTS PILOT IN US

๐ŸŒAPPLE SUED OVER BROKEN WATCH SCREENS THAT INJURED CUSTOMERS IN US

๐ŸŒTESLA ALLOWS US USERS TO PLAY VIDEO GAMES IN MOVING CARS

๐ŸŒHACKERS ATTACK BRAZIL'S HEALTH MINISTRY,DELETE VACCINATION DATA

๐ŸŒGOOGLE EXTENDS NEW APP STORE POLICY DEADLINE IN INDIA TO OCT 2022

๐ŸŒCHINA REMOVES 106 APPS FROM APP STORES CITING PRIVACY VIOLATIONS

๐ŸŒIMPRISONED SILK ROAD FIRST NFT SELLS FOR $6.2 MILLION

๐ŸŒ97.23 TERABYTES/MONTH DATA BEING CONSUMED AT 6071 RAILWAY STATIONS THAT HAVE FREE WIFI:GOVT

๐ŸŒTRAI ASKS BROADCASTERS AND DPOs TO COMPLY WITH IA REGULATIONS

๐ŸŒDOT MOVES NCLAT AGAINST RESOLUTION OF VIDEOCON;CLAIMS RS 881.92 CR DUE FROM VIDEOCON TELECOM

๐ŸŒGOOGLE TO BRING ANDROID GAMES TO WINDOWS IN 2022: REPORT

๐ŸŒGOVERNMENT TO IMPLEMENT MOBILE PRIVACY AND SECURITY INITIATIVE:RAJESH PANT

๐ŸŒSAMSUNG BUSTS COUNTERFEIT TV RACKET IN DELHI

๐ŸŒSERIOUS BUG PUTS APPLE ICLOUD TWITTER, MINECRAFT AT HACKING THREAT

๐ŸŒCHINESE HACKERS TARGETED GOVERNMENT AND PRIVATE SECTOR ENTITIES COUNTRIES LIKE MALAYSIA , INDONESIA AND VIETNAM:REPORT

๐ŸŒHACKER IMPERSONATING CUSTOMER SUPPORT LED TO A DATA BREACH AT COX

๐ŸŒHACKERS ARE TARGETING OVER A MILLION WORDPRESS SITES IN ONGOING ATTACKS

๐ŸŒNEW WHITE HOUSE POLICY GIVES AGENCIES 24 HOURS TO ASSESS CYBERATTACKS OF POTENTIAL NATIONAL SECURITY CONCERN

๐ŸŒKALILINUX 2021.4 RELEASED WITH SAMBA COMPATIBILITY , APPLE M1 SUPPORT , 9 NEW TOOLS

๐ŸŒRUSSIA BLOCKS TOR PRIVACY SERVICE IN LATEST CENSORSHIP MOVE

๐ŸŒBLACKCAT:A NEW RUST BASED RANSOMWARE MALWARE SPOTTED IN THE WILD

๐ŸŒINSTAGRAM AIMS TO BRING BACK A CHRONOLOGICAL FEED IN 2022

๐ŸŒNEED TIGHTER REGULATIONS TO DEAL WITH CYBER CRIMES : IT MINISTER IN LOK SABHA

๐ŸŒDOT TO DEACTIVATE EXTRA SIM OF SUBSCRIBER BEYOND 9 CONNECTIONS

๐ŸŒRBI TO FORM PANEL TO STUDY DIGITAL PAYMENT CHARGES

๐ŸŒVODAFONE IDEA TO DEPLOY BLOCKCHAIN ENABLED ENTERPRISE PLATFORM :PARTNERS TANLA

๐ŸŒCENTRAL INSTITUTE FOR INDIAN LANGUAGES , KOO COLLABORATE TO PROMOTE FAIR USE OF LANGUAGE

DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Freelearningtech pinned Deleted message
๐Ÿ˜ˆ STORMKITTY STEALER SOURCE CODE ๐Ÿ˜ˆ

Disclaimer - For research purposes only!

This is a Stealer + Clipper + Keylogger in one.
Stealer written on C#, logs will be sent to Telegram bot.

๐Ÿ”ฑ Data extraction:

โœ”๏ธAntiAnalysis (VirtualBox, SandBox, Debugger, VirusTotal, Any.Run)
โœ”๏ธGet system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps)
โœ”๏ธChromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks)
โœ”๏ธFirefox based browsers (db files, cookies, history, bookmarks)
โœ”๏ธInternet explorer/Edge (passwords)
โœ”๏ธSaved wifi networks & scan networks around device (SSID, BSSID)
โœ”๏ธFile grabber (Documents, Images, Source codes, Databases, USB)
โœ”๏ธDetect banking & cryptocurrency services in browsers
โœ”๏ธSteam, Uplay, Battle.Net, Minecraft session
โœ”๏ธInstall keylogger & clipper
โœ”๏ธDesktop & Webcam screenshot
โœ”๏ธProtonVPN, OpenVPN, NordVPN
โœ”๏ธCryptocurrency Wallets
โœ”๏ธDirectories structure
โœ”๏ธTelegram sessions
โœ”๏ธOutlook accounts
โœ”๏ธPidgin accounts
โœ”๏ธSkype session
โœ”๏ธDiscord tokens
โœ”๏ธFilezilla hosts
โœ”๏ธProcess list
โœ”๏ธProduct key
โœ”๏ธAutorun module

๐Ÿ”ฅ Features:

These functions will become available in the builder only if you have autorun enabled.

๐ŸŽน Keylogger:
โ€” The keylogger will turn on if the user is texting in the chat or using the bank's website.
๐Ÿ“‹ Clipper:
โ€” Clipper turns on and replaces crypto wallet addresses in the clipboard when a user makes a transaction.
๐Ÿ“ธ Webcam screenshots:
โ€” Webcam screenshots will be taken if the user is watching something obscene on the Internet.

๐Ÿ”— Source Code :
https://github.com/swagkarna/StormKitty
โ‡๏ธ Web Hack Tool Links


โ‡๏ธ WordPress admin finder ๐Ÿ”— Link : https://github.com/kancoq/wpaf

โ‡๏ธ scannerhttps://github.com/TechnicalMujeeb/smb-scanner

โ‡๏ธ Heart Bleed scanner
๐Ÿ”— Link : https://github.com/TechnicalMujeeb/HeartBleed

โ‡๏ธ weevely php web shell
๐Ÿ”— Link : https://github.com/sunge/Weevely

โ‡๏ธ Webponized web shell
๐Ÿ”— Link : https://github.com/epinna/weevely3

โ‡๏ธ Nikto web scanner tool
๐Ÿ”— Link : https://github.com/sullo/nikto

โ‡๏ธ Auto Ip or domain Attacking Tool
๐Ÿ”— Link : https://github.com/Bhai4You/Ip-Attack

https://t.me/TheStarkArmy
โ‡๏ธ Click jacking vulnerability scanner
๐Ÿ”— Link : https://github.com/D4Vinci/Clickjacking-Tester

โ‡๏ธ All in 1 information gathering and web penetration tool DTect
๐Ÿ”— Link : https://github.com/Audi0x01/D-TECT-1

โ‡๏ธ Detect phishing URL
๐Ÿ”— Link : https://github.com/UndeadSec/checkURL

โ‡๏ธ Dos attack tool - Golden eye
๐Ÿ”— Link : https://github.com/jseidl/GoldenEye

โ‡๏ธ Dos attack with hulk
๐Ÿ”— Link : https://github.com/grafov/hulk

โ‡๏ธ Sql vulnerability scanner
๐Ÿ”— Link : https://github.com/Pure-L0G1C/SQL-scanner

https://t.me/TheStarkArmy
โ‡๏ธ hack website with sqlmap
๐Ÿ”— Link : https://github.com/sqlmapproject/sqlmap

โ‡๏ธ information and vulnerability scanner with striker
๐Ÿ”— Link : https://github.com/s0md3v/Striker

โ‡๏ธ web server attacking tool with dost
๐Ÿ”— Link : https://github.com/verluchie/dost-attack

โ‡๏ธ advanced multithreaded admin panel finder
๐Ÿ”— Link : https://github.com/s0md3v/Breacher

โ‡๏ธ Ssl vulnerability scanner
๐Ÿ”— Link : https://github.com/PortSwigger/ssl-scanner

โ‡๏ธ sublister - Subdomain enumeration
๐Ÿ”— Link : https://github.com/aboul3la/Sublist3r

โ‡๏ธ WordPress vulnerability scanner and attacker
๐Ÿ”— Link : https://github.com/wpscanteam/wpscan

โ‡๏ธ Hunner scanner framework
๐Ÿ”— Link : https://github.com/b3-v3r/Hunner


โ‡๏ธ Red hawk all in 1 information gathering and scanning tool
๐Ÿ”— Link : https://github.com/Tuhinshubhra/RED_HAWK

โ‡๏ธ Dos attack tool with Xerxes
๐Ÿ”— Link : https://github.com/sepehrdaddev/Xerxes

โ‡๏ธ social fish phishing tool
๐Ÿ”— Link : https://github.com/UndeadSec/SocialFish

โ‡๏ธ weeman phishing tool no root
๐Ÿ”— Link : https://github.com/evait-security/weeman

โ‡๏ธ WordPress security scanner Wpseku
๐Ÿ”— Link : https://github.com/m4ll0k/WPSeku

โ‡๏ธ IDN homograph attack tool
๐Ÿ”— Link : https://github.com/UndeadSec/EvilURL

โ‡๏ธ Detect security flaws with CMS
๐Ÿ”— Link : https://github.com/Dionach/CMSmap

โ‡๏ธ Fire crack , admin, finders, deface, bing dorking etc
๐Ÿ”— Link : https://github.com/Ranginang67/Firecrack

โ‡๏ธ Pish web tool
๐Ÿ”— Link : https://github.com/Cabdulahi/pish

โ‡๏ธ MITM attack tool
๐Ÿ”— Link : https://github.com/websploit/websploit

โ‡๏ธ kill shot pentesting framework
๐Ÿ”— Link :https://github.com/bahaabdelwahed/killshot