CVE Seeker — Unveiling Cyber Threats: From Assets to Vulnerability InsightsIn the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. Introducing CVE Seeker, a comprehensive…Jun 24, 2024Jun 24, 2024
Enhancing Penetration Testing with CVE Checker Script — ThreatTracer.pPenetration testing, often known as ethical hacking, plays a pivotal role in identifying security vulnerabilities within systems, networks…Aug 10, 2023Aug 10, 2023
GraphQL Test Cases: A Comprehensive Checklist for Bug Bounty Hunters and Penetration TestersChecklist available here: https://anmolksachan.github.io/graphql/Apr 11, 2023Apr 11, 2023
JIRA”YA — JIRA Yet Another vulnerability AnalyzerAs software development teams use JIRA to track and manage tasks, it has become a popular project management tool. However, with increased…Mar 28, 2023Mar 28, 2023
What The Cipher: A Python Tool for Pentesters and Security AssessmentsIn this era of growing cybersecurity threats, it is necessary to ensure that the communication between a server and a client is secure. It…Mar 21, 2023Mar 21, 2023
Cross Injector — A Python Script for Cross-Site Scripting (XSS) DetectionCross-site scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious code into web pages viewed by…Mar 8, 2023Mar 8, 2023
The Time Machine — Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and…You must have heard about time travel in movies, series and comics. Well here we are Nah i’m not joking you can travel back in time and…Jan 29, 20222Jan 29, 20222