Home
Services
Blog
Home Blog
Development
Exploit
Exploitation-tools
Network
Pentesting
Phone
Reconnaissance-tools
Reverse-engineering
Security
Web-security
Categories
Contact
Home
Categories
Tags
Contact
Menu
Menu
Home
0x1 | Cyber Security Consulting
The Ethical Hacking Blog
JavaScript is
disabled
. The best security you can get in a web browser 🕵️♀️
SQLi Auth Bypass payloads
Web-Security
SQLi Auth Bypass payloads
Web-Security
VAmPI - The Vulnerable API
Web-Security
VAmPI - The Vulnerable API
Web-Security
NETReactorSlayer - Deobfuscator for Eziriz .NET Reactor
Reverse-Engineering
NETReactorSlayer - Deobfuscator for Eziriz .NET Reactor
Reverse-Engineering
The finest Windows Optimizer
Security
The finest Windows Optimizer
Security
PacketStreamer - Tcpdump for cloud native environments
Network
PacketStreamer - Tcpdump for cloud native environments
Network
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
Microsoft Office RCE Vulnerability aka Follina - CVE-2022-30190
Exploit
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
AutoPWN Suite - Scanning vulnerabilities and exploiting systems automatically
Exploitation-Tools
Puwr - SSH attack surface on local network
Network
Puwr - SSH attack surface on local network
Network
CRLFsuite - Fast CRLF injection scanning tool
Web-Security
CRLFsuite - Fast CRLF injection scanning tool
Web-Security
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
NotionTerm - Embed reverse shell in Notion pages
Exploitation-Tools
MITM Intercept
Network
MITM Intercept
Network
k0otkit - Manipulate K8s in a K8s way
Pentesting
k0otkit - Manipulate K8s in a K8s way
Pentesting
1
2
3
4
5
6
7