
https://digitalinvestigator.blogspot.com/2021/03/analysing-volatile-evidence-in-windows.html
https://digitalinvestigator.blogspot.com/2022/04/wmic-for-incident-response.html
https://digitalinvestigator.blogspot.com/2022/05/configuring-mozilla-firefox-browser-for.html
https://digitalinvestigator.blogspot.com/2022/05/linux-commands-for-incident-response_31.html
https://digitalinvestigator.blogspot.com/2022/06/file-system-forensics-with-sleuthkit.html
https://digitalinvestigator.blogspot.com/2022/06/windows-powershell-commands-for.html
https://hakin9.org/autovpn-create-on-demand-disposable-openvpn-endpoints-on-aws/
https://hakin9.org/azurehunter-a-cloud-forensics-powershell-module-to-run-threat-hunting-playbooks-on-data-from-azure-and-o365/
https://hakin9.org/beast-bomber-sms-bomber-email-spammer-whatsapp-spammer-telegram-spammer-discord-spammer-and-dos-attacker/
https://hakin9.org/blackbird-an-osint-tool-to-search-for-accounts-by-username-in-social-networks/
https://hakin9.org/c41n-an-automated-rogue-access-point-setup-tool/
https://hakin9.org/cloudtopolis/
https://hakin9.org/course/exploiting-authentication-and-access-control-mechanisms-with-burp-suite-w65/curriculum/
https://hakin9.org/create-a-fake-access-point-by-anastasis-vasileiadis/
https://hakin9.org/dark-web-search-practical-osint-and-socmint-techniques-free-course-content/
https://hakin9.org/download/hakin9-open-open-source-tools/
https://hakin9.org/download/open-source-tools-for-2021/
https://hakin9.org/download/targeted-phishing-attacks-preview/
https://hakin9.org/dronesploit-a-pentesting-console-framework-dedicated-to-drones/
https://hakin9.org/fsociety-hacking-tools-pack-a-penetration-testing-framework/
https://hakin9.org/gimmesh-a-tool-that-generates-a-custom-cheatsheet-for-reverse-shell-file-transfer-and-msfvenom/
https://hakin9.org/h4rpy-an-automated-wpa-wpa2-psk-attack-tool/
https://hakin9.org/hackerenv-automation-tool-that-quickly-and-easily-sweep-ips-and-scan-ports-vulnerabilities-and-exploit-them/
https://hakin9.org/hackingtool-all-in-one-hacking-tool-for-hackers/
https://hakin9.org/hakrawler-a-fast-cli-web-crawler-for-hackers/
https://hakin9.org/harpoon-osint-cli-tool/
https://hakin9.org/hetty-an-http-toolkit-for-security-research/
https://hakin9.org/homepwn-swiss-army-knife-for-pentesting-of-iot-devices/
https://hakin9.org/how-to-scale-your-osint-research-with-data-enrichment/
https://hakin9.org/http-revshell-powershell-reverse-shell-using-http-s-protocol-with-amsi-bypass-and-proxy-aware/
https://hakin9.org/injuredandroid-a-vulnerable-android-application-that-shows-simple-examples-of-vulnerabilities-in-a-ctf-style/
https://hakin9.org/jackdaw-tool-to-collect-all-information-in-your-domain/
https://hakin9.org/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/
https://hakin9.org/linux-smart-enumeration/
https://hakin9.org/lnkbomb-malicious-shortcut-generator-for-collecting-ntlm-hashes/
https://hakin9.org/manuka-a-modular-osint-honeypot-for-blue-teamers/
https://hakin9.org/maryam-open-source-intelligenceosint-framework/
https://hakin9.org/mip22-an-advanced-phishing-tool/
https://hakin9.org/nerve-network-exploitation-reconnaissance-vulnerability-engine/
https://hakin9.org/netdata-real-time-performance-monitoring/
https://hakin9.org/obfuscapk-a-black-box-obfuscation-tool-for-android-apps/
https://hakin9.org/onex-a-kali-linux-hacking-tools-installer-for-termux-and-other-linux-distribution/
https://hakin9.org/osi-ig-information-gathering-instagram/
https://hakin9.org/osinteye-username-enumeration-reconnaisance-suite/
https://hakin9.org/ostorlab-a-composable-security-scanning-platform-for-all-assets/
https://hakin9.org/pagodo-passive-google-dork-automate-google-hacking-database-scraping-and-searching/
https://hakin9.org/phantun-a-lightweight-and-fast-udp-to-tcp-obfuscator/
https://hakin9.org/phoneinfoga-advanced-information-gathering-osint-framework-for-phone-numbers/
https://hakin9.org/project-iky-tool-that-collects-information-from-an-email/
https://hakin9.org/pyphisher-easy-to-use-phishing-tool-with-65-website-templates/
https://hakin9.org/reconspider-most-advanced-open-source-intelligence-osint-framework/
https://hakin9.org/rengine-an-automated-recon-framework-for-web-applications/
https://hakin9.org/reverse-shell-generator-by-ryan-montgomery/
https://hakin9.org/saferwall-is-an-open-source-malware-analysis-platform/
https://hakin9.org/scrummage-tool-that-centralises-search-functionality-from-powerful-yet-simple-osint-sites/
https://hakin9.org/sillyrat-a-cross-platform-multifunctional-windows-linux-mac-rat/
https://hakin9.org/t14m4t-automated-brute-forcing-attack-tool/
https://hakin9.org/vmpdump-a-dynamic-vmp-dumper-and-import-fixer-powered-by-vtil/
https://hakin9.org/wifibroot-a-wireless-pentest-cracking-tool-for-4-way-handshake-pmkid/
https://hakin9.org/xploitspy-is-an-android-monitoring-spying-tool/
https://latesthackingnews.com/2018/07/18/blackeye-a-free-phishing-tool/
https://latesthackingnews.com/2018/08/17/rapidscan-web-vulnerability-scanner-framework/
https://latesthackingnews.com/2018/08/22/singularity-open-source-dns-rebinding-attack-tool/
https://latesthackingnews.com/2018/09/04/sonarsnoop-a-technique-used-to-steal-smartphone-unlock-patterns/
https://latesthackingnews.com/2018/09/16/morpheus-tcp-udp-manipulation-framework/
https://latesthackingnews.com/2018/10/12/yuki-chan-the-auto-web-penetration-testing-tool/
https://latesthackingnews.com/2018/10/18/wapiti-the-black-box-vulnerability-scanner-for-web-applications/
https://latesthackingnews.com/2018/10/26/phishx-spear-phishing-tool-for-capturing-credentials/
https://latesthackingnews.com/2018/12/02/blackeye-open-source-lan-phishing-tool-for-penetration-testing/
https://latesthackingnews.com/2018/12/20/brosec-an-open-source-interactive-tool-to-utilize-payloads-and-commands/
https://latesthackingnews.com/2018/12/22/avet-open-source-tool-for-anti-virus-evasion/
https://latesthackingnews.com/2019/01/13/modlishka-open-source-tool-for-advanced-phishing-campaigns/
https://latesthackingnews.com/2019/11/18/6-osint-tools-that-make-a-pentesters-life-easier/
https://latesthackingnews.com/2022/05/25/multiple-vulnerabilities-in-facebook-could-allow-account-takeover/
https://latesthackingnews.com/2022/05/25/multiple-vulnerabilities-in-facebook-could-allow-account-takeover/
https://pentestmag.com/how-i-created-an-undetectable-backdoor-for-windows-ethical-hacking-2/
https://pentestmag.com/product/powershell-and-windows-for-red-teamers/
https://thehackernews.com/2022/06/yoda-tool-found-47000-malicious.html
https://www.tecmint.com/file-sharing-from-linux-commandline/
https://www.tecmint.com/mysqladmin-commands-for-database-administration-in-linux/
