Home » Tech

ExchangeRelayX – OWA for hackers

This instrument provides the attacker having an OWA looking interface, using the user’s contacts and mailbox. Features Raw XML accessibility to the EWS host, so you can send requests to features and functions that Weren’t pre-programmed in exchangeRelayx…

Read More »

Detect Evil Maid Attacks: Do Not Disturb

Among the most effective ways to undermine a computer is with physical accessibility. A lot of people have probably left our notebooks unattended (possibly in a hotel room when traveling?). It would be wonderful to know if someone…

Read More »

Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

  BLACKEYE is an update from the first shellfish instrument by the Linux choice under GNU license. BLACKEYE is the most complete Phishing Tool, using 32 templates +1 customizable and it functions just on LAN. Blackeye Usage git…

Read More »

Microsoft Research Detours Package

  Detours have been utilized by several ISVs and are also used by product groups at Microsoft. Detours are now available under a typical open source license (MIT). This simplifies licensing for programmers using Detours and enables the…

Read More »

Ring 0 Army Knife -r0ak

Motivation The Windows kernel is a rich environment where countless drivers execute on a normal system, and in which thousands of factors containing global state are present. For advanced troubleshooting, IT specialists will typically utilize tools like the…

Read More »

“Kernel security check failure” error in Windows 10

“Kernel security check failure” error in Windows 10

What if you cannot Log in to Windows? In the event, you’re not able to boot into Windows and login to try the repairs that are presented, then boot into advanced startup options (Safe Mode). Fix 1: Do…

Read More »