Home
Services
Blog
Home Blog
Development
Exploit
Exploitation-tools
Network
Pentesting
Phone
Reconnaissance-tools
Reverse-engineering
Security
Web-security
Categories
Contact
Home
Categories
Tags
Contact
Menu
Menu
Home
Categories
0x1 Blog - Categories
All
Development
Exploit
Exploitation-Tools
Network
Pentesting
Phone
Reconnaissance-Tools
Reverse-Engineering
Security
Web-Security
Agile Web Development with Rails 5.1
Development
Beginning C++ 17
Development
dns-prefetch
Development
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
BotenaGo Malware Targets Millions of IoT Devices
Exploit
DotCMS Remote Code Execution | CVE-2022-26352
Exploit
SpringBoot RCE | CVE-2022-22963
Exploit
Dirty Pipe - Linux Local Privilege Escalation
Exploit
Auto-Elevate
Exploit
Log4shell | CVE-2021-44228
Exploit
PwnKit-Exploit
Exploit
GTFOBins - Search for Unix binaries
Exploit
OWASP ZSC Tool
Exploit
UAC Bypass in Windows 10 Store Binary
Exploit
Bypassing UAC using App Paths
Exploit
Another sdclt UAC bypass
Exploit
Bypassing UAC on Windows 10 using Disk Cleanup
Exploit
Linux Privilege Escalation
Exploit
Windows Privilege Escalation
Exploit
baby pwn 2018 CTF
Exploit
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
Tornado | anonymously reverse shell
Exploitation-Tools
CobaltBus | Cobalt Strike C2 traffic via Azure Servicebus
Exploitation-Tools
Shhhloader | Shellcode Loader
Exploitation-Tools
OffensiveNotion C2
Exploitation-Tools
Phant0m | Windows Event Log Killer
Exploitation-Tools
TAS
Exploitation-Tools
SUID3NUM
Exploitation-Tools
Donut
Exploitation-Tools
Postenum
Exploitation-Tools
Faction C2 Framework
Exploitation-Tools
Sliver
Exploitation-Tools
FudgeC2
Exploitation-Tools
C3 Custom Command and Control
Exploitation-Tools
Telegram Csharp C2
Exploitation-Tools
GhostTunnel
Exploitation-Tools
goDoH
Exploitation-Tools
Winpayloads
Exploitation-Tools
0xsp Mongoose
Exploitation-Tools
AutoRDPwn
Exploitation-Tools
o365-attack-toolkit
Exploitation-Tools
Linux Smart Enumeration
Exploitation-Tools
Tyton: Kernel-Rootkit
Exploitation-Tools
SILENTTRINITY
Exploitation-Tools
Koadic C3
Exploitation-Tools
Kage
Exploitation-Tools
BloodHound
Exploitation-Tools
PyFuscation
Exploitation-Tools
Covenant
Exploitation-Tools
OpenC2
Exploitation-Tools
DeathStar
Exploitation-Tools
PacketStreamer - Tcpdump for cloud native environments
Network
Puwr - SSH attack surface on local network
Network
MITM Intercept
Network
Malcolm Network Traffic Analysis Tool
Network
The Zeek Network Security Monitor
Network
BruteShark - Network Analysis Tool
Network
NetCap
Network
Sparrow Wifi
Network
XRay
Network
SKA - Simple Karma Attack
Network
LetsMapYourNetwork
Network
Ehtools
Network
PA-Toolkit | Pentester Academy Wireshark Toolkit
Network
WiFi-Pumpkin
Network
VoIPShark
Network
Inflator
Network
FeedingBottle
Network
k0otkit - Manipulate K8s in a K8s way
Pentesting
Cobalt Strike MANUALS_V2 Active Directory
Pentesting
Malicious PDF Generator ☠️
Pentesting
Xerror
Pentesting
Metasploit Pro
Pentesting
Defcon27 Csharp Workshop
Pentesting
Atomic Red Team
Pentesting
Modlishka: Reverse-Proxy
Pentesting
Trape
Pentesting
Hashview
Pentesting
Infection Monkey
Pentesting
Red Teaming/Adversary Simulation Toolkit
Pentesting
Active Directory Kill Chain Attack and Defense
Pentesting
DroidDetective analysing Android applications
Phone
Obfuscapk
Phone
Andriller
Phone
SimJacker
Phone
email2phonenumber
Phone
StaCoAn
Phone
VoiceMailAutomator
Phone
iBoot IOS 9.3 Leaked
Phone
Android Security List
Phone
Sub3suite - Subdomain Enumeration Suite
Reconnaissance-Tools
Mip22 - Advanced Phishing Tool
Reconnaissance-Tools
Nivistealer
Reconnaissance-Tools
Misp Dashboard
Reconnaissance-Tools
lsassy
Reconnaissance-Tools
AttackSurfaceMapper
Reconnaissance-Tools
Kamerka GUI
Reconnaissance-Tools
AIL Framework
Reconnaissance-Tools
Pown Recon
Reconnaissance-Tools
RedELK
Reconnaissance-Tools
NETReactorSlayer - Deobfuscator for Eziriz .NET Reactor
Reverse-Engineering
MitmProxy2Swagger - Automagically reverse-engineer REST API
Reverse-Engineering
Xepor - web routing framework for reverse engineers and security researchers
Reverse-Engineering
Binary Ninja 3.0
Reverse-Engineering
bkcrack - crack legacy zip
Reverse-Engineering
x64dbg Plugin Manager
Reverse-Engineering
ngrev
Reverse-Engineering
Deobfuscated BurpSuite Pro 2.1
Reverse-Engineering
Redress - A tool for analyzing stripped binaries
Reverse-Engineering
PyREBox
Reverse-Engineering
Ghidra Software Reverse Engineering Framework
Reverse-Engineering
Cutter - Radare2 Gui
Reverse-Engineering
Cracking HawkEye Keylogger Reborn
Reverse-Engineering
The finest Windows Optimizer
Security
Security Onion Linux distro for intrusion detection
Security
S1EM
Security
HaccTheHub
Security
ThreatMapper
Security
ApplicationInspector
Security
Trivy
Security
Windows and Office ISO Download
Security
Stegify
Security
The Ultimate Guide to Ethical Hacking
Security
ACT | Semi-Automated Cyber Threat Intelligence
Security
OnionShare
Security
Malware Analysis Tools List
Security
Dnscrypt Proxy Gui
Security
Ricochet
Security
SQLi Auth Bypass payloads
Web-Security
VAmPI - The Vulnerable API
Web-Security
CRLFsuite - Fast CRLF injection scanning tool
Web-Security
Web Attack Payloads Wordlist
Web-Security
Wfuzz - The Web fuzzer
Web-Security
OWASP Coraza Web Application Firewall v2
Web-Security
PyShell
Web-Security
LKWA
Web-Security
AppSpider
Web-Security
Server Side Template Injection
Web-Security
HackBar V2
Web-Security
ezXSS
Web-Security
Tplmap
Web-Security
PHPGGC
Web-Security
JSONBee
Web-Security
Femida-xss
Web-Security
Postshell
Web-Security
Traxss
Web-Security
CSS Exfil Protection
Web-Security
XSS Attack
Web-Security
Singularity of Origin
Web-Security
Pixload
Web-Security
Weaponised XSS Payloads
Web-Security
Block Alert XSS
Web-Security
XSpear
Web-Security
XSRFProbe
Web-Security
The TIDoS Framework
Web-Security
Vuls | VULnerability Scanner
Web-Security
Revshellgen
Web-Security
B-XSSRF
Web-Security
HTTP Request Smuggler
Web-Security
Osmedeus
Web-Security
Jok3r v3
Web-Security
CMS Scan
Web-Security