Latest Posts

Latest Posts

ToriFY: Automating Traffic Routing Through TOR with Dynamic IP and Custom MAC Address

ToriFY is a tool to Automate [anonsurf] and [macchanger] to redirect all the traffic in your device to TOR and spoof your mac address within...

Danial Zahoor 29 Apr, 2024

Tips from Your Friendly Hacker to Keep You Safe Online

In the realm of online security, the advice often comes from self-proclaimed experts. But why not take cues from a genuine hacker? In the d...

Danial Zahoor 22 Apr, 2024

How Do Man-in-the-Middle Attacks Work, and How Do We Prevent Them?

Man-in-the-middle (MiTM) attacks pose a significant threat to cybersecurity, involving unauthorized interception of communications between t...

Danial Zahoor 21 Apr, 2024

What is a Man-in-the-Middle (MITM) Attack?

A man-in-the-middle (MITM) attack is  a cyber attack where an attacker places themselves between two communicating parties, relaying messa...

Danial Zahoor 20 Apr, 2024

Porch Pirate: The Ultimate Postman Recon and OSINT Tool

Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation ...

Danial Zahoor 15 Apr, 2024

APKDeepLens - Android security insights in full spectrum.

APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities. It specifically targets t...

Danial Zahoor 14 Apr, 2024

SARA - Simple Android Ransomware Attack

SARA is a simple tool to create Trojan or Ransomware for Android devices

Danial Zahoor 29 Mar, 2024