XML Sitemap

This is a XML Sitemap which is supposed to be processed by search engines which follow the XML Sitemap standard like Ask.com, Bing, Google and Yahoo.
It was generated using the WordPress content management system and the Google Sitemap Generator Plugin by Arne Brachhold.
You can find more information about XML sitemaps on sitemaps.org and Google's list of sitemap programs.

URLPriorityChange frequencyLast modified (GMT)
https://hacker-gadgets.com/blog/2020/08/31/mihari-a-helper-to-run-osint-queries-manage-results-continuously/20%Monthly2020-08-31 16:19
https://hacker-gadgets.com/blog/2020/08/31/sourcewolf-amazingly-fast-response-crawler-to-find-juicy-stuff-in-the-source-code/20%Monthly2020-08-31 01:15
https://hacker-gadgets.com/blog/2020/08/30/iblessing-an-ios-security-exploiting-toolkit-it-mainly-includes-application-information-collection-static-analysis-and-dynamic-analysis/20%Monthly2020-08-30 15:14
https://hacker-gadgets.com/blog/2020/08/30/urlgrab-a-golang-utility-to-spider-through-a-website-searching-for-additional-links/20%Monthly2020-08-30 00:08
https://hacker-gadgets.com/blog/2020/08/29/osintgram-a-osint-tool-on-instagram/20%Monthly2020-08-29 14:06
https://hacker-gadgets.com/blog/2020/08/28/vulnerable-ad-create-a-vulnerable-active-directory-thats-allowing-you-to-test-most-of-active-directory-attacks-in-local-lab/20%Monthly2020-08-28 23:03
https://hacker-gadgets.com/blog/2020/08/28/bluescan-a-powerful-bluetooth-scanner-for-scanning-br-le-devices-lmp-sdp-gatt-and-vulnerabilities/20%Monthly2020-08-28 12:57
https://hacker-gadgets.com/blog/2020/08/27/sharphose-asynchronous-password-spraying-tool-in-c-for-windows-environments/20%Monthly2020-08-27 21:48
https://hacker-gadgets.com/blog/2020/08/27/bashtop-linux-osx-freebsd-resource-monitor/20%Monthly2020-08-27 16:46
https://hacker-gadgets.com/blog/2020/08/27/hack-tools-the-all-in-one-red-team-extension-for-web-pentester/20%Monthly2020-08-27 01:44
https://hacker-gadgets.com/blog/2020/08/26/ezemu-simple-execution-of-commands-for-defensive-tuning-research/20%Monthly2020-08-26 15:41
https://hacker-gadgets.com/blog/2020/08/26/volexp-volatility-explorer/20%Monthly2020-08-26 00:37
https://hacker-gadgets.com/blog/2020/08/25/aws-recon-multi-threaded-aws-inventory-collection-tool-with-a-focus-on-security-relevant-resources-and-metadata/20%Monthly2020-08-25 19:35
https://hacker-gadgets.com/blog/2020/08/24/yeti-your-everyday-threat-intelligence/20%Monthly2020-08-24 23:28
https://hacker-gadgets.com/blog/2020/08/24/parth-heuristic-vulnerable-parameter-scanner/20%Monthly2020-08-24 13:26
https://hacker-gadgets.com/blog/2020/08/23/pyre-check-performant-type-checking-for-python/20%Monthly2020-08-23 22:21
https://hacker-gadgets.com/blog/2020/08/23/intel-owl-analyze-files-domains-ips-in-multiple-ways-from-a-single-api-at-scale/20%Monthly2020-08-23 17:20
https://hacker-gadgets.com/blog/2020/08/23/scan-for-webcams-scan-for-webcams-in-the-internet/20%Monthly2020-08-23 02:18
https://hacker-gadgets.com/blog/2020/08/22/cloud-sniper-virtual-security-operations-center/20%Monthly2020-08-22 16:15
https://hacker-gadgets.com/blog/2020/08/22/secgen-create-randomly-insecure-vms/20%Monthly2020-08-22 01:12
https://hacker-gadgets.com/blog/2020/08/21/adbsploit-a-python-based-tool-for-exploiting-and-managing-android-devices-via-adb/20%Monthly2020-08-21 15:11
https://hacker-gadgets.com/blog/2020/08/21/wonitor-fast-zero-config-web-endpoint-change-monitor/20%Monthly2020-08-21 00:03
https://hacker-gadgets.com/blog/2020/08/20/dropengine-malleable-payloads/20%Monthly2020-08-20 14:02
https://hacker-gadgets.com/blog/2020/08/19/reconspider-most-advanced-open-source-intelligence-osint-framework-for-scanning-ip-address-emails-websites-organizations/20%Monthly2020-08-19 22:51
https://hacker-gadgets.com/blog/2020/08/19/pagodo-automate-google-hacking-database-scraping-and-searching/20%Monthly2020-08-19 12:48
https://hacker-gadgets.com/blog/2020/08/19/kali-linux-2020-3-release-penetration-testing-and-ethical-hacking-linux-distribution/20%Monthly2020-08-19 07:45
https://hacker-gadgets.com/blog/2020/08/18/purplesharp-c-adversary-simulation-tool-that-executes-adversary-techniques-with-the-purpose-of-generating-attack-telemetry-in-monitored-windows-environments/20%Monthly2020-08-18 21:42
https://hacker-gadgets.com/blog/2020/08/18/sinter-a-user-mode-application-authorization-system-for-macos-written-in-swift/20%Monthly2020-08-18 16:39
https://hacker-gadgets.com/blog/2020/08/18/iot-pt-a-virtual-environment-for-pentesting-iot-devices/20%Monthly2020-08-18 01:36
https://hacker-gadgets.com/blog/2020/08/17/urlbuster-powerful-mutable-web-directory-fuzzer-to-bruteforce-existing-and-or-hidden-files-or-directories/20%Monthly2020-08-17 15:33
https://hacker-gadgets.com/blog/2020/08/17/powersharppack-many-usefull-offensive-csharp-projects-wraped-into-powershell-for-easy-usage/20%Monthly2020-08-17 00:31
https://hacker-gadgets.com/blog/2020/08/16/spybrowse-code-developed-to-steal-certain-browser-config-files-history-preferences-etc/20%Monthly2020-08-16 14:29
https://hacker-gadgets.com/blog/2020/08/15/checkxss-detect-xss-vulnerability-in-web-applications/20%Monthly2020-08-15 23:25
https://hacker-gadgets.com/blog/2020/08/15/phirautee-a-poc-crypto-virus-to-spread-user-awareness-about-attacks-and-implications-of-ransomwares/20%Monthly2020-08-15 13:23
https://hacker-gadgets.com/blog/2020/08/14/unfollow-plus-automated-instagram-unfollower-bot/20%Monthly2020-08-14 22:17
https://hacker-gadgets.com/blog/2020/08/14/dagobah-open-source-tool-to-generate-internal-threat-intelligence-inventory-compliance-data-from-aws-resources/20%Monthly2020-08-14 17:16
https://hacker-gadgets.com/blog/2020/08/14/aws-report-a-tool-for-analyzing-amazon-resources/20%Monthly2020-08-14 02:11
https://hacker-gadgets.com/blog/2020/08/13/bastillion-a-web-based-ssh-console-that-centrally-manages-administrative-access-to-systems/20%Monthly2020-08-13 16:06
https://hacker-gadgets.com/blog/2020/08/13/nautilus-a-grammar-based-feedback-fuzzer/20%Monthly2020-08-13 01:00
https://hacker-gadgets.com/blog/2020/08/12/sharpchromium-net-4-0-clr-project-to-retrieve-chromium-data-such-as-cookies-history-and-saved-logins/20%Monthly2020-08-12 14:56
https://hacker-gadgets.com/blog/2020/08/11/skyark-helps-to-discover-assess-and-secure-the-most-privileged-entities-in-azure-and-aws/20%Monthly2020-08-11 23:45
https://hacker-gadgets.com/blog/2020/08/11/pe-tree-python-module-for-viewing-portable-executable-pe-files-in-a-tree-view/20%Monthly2020-08-11 13:43
https://hacker-gadgets.com/blog/2020/08/10/flask-session-cookie-manager-flask-session-cookie-decoder-encoder/20%Monthly2020-08-10 22:37
https://hacker-gadgets.com/blog/2020/08/10/arcane-a-simple-script-designed-to-backdoor-ios-packages-iphone-arm-and-create-the-necessary-resources-for-apt-repositories/20%Monthly2020-08-10 12:33
https://hacker-gadgets.com/blog/2020/08/10/irfuzz-simple-scanner-with-yara-rule/20%Monthly2020-08-10 02:27
https://hacker-gadgets.com/blog/2020/08/09/evine-interactive-cli-web-crawler/20%Monthly2020-08-09 16:21
https://hacker-gadgets.com/blog/2020/08/09/sharpapplocker-c-port-of-the-get-applockerpolicy-ps-cmdlet/20%Monthly2020-08-09 01:17
https://hacker-gadgets.com/blog/2020/08/08/phishingkittracker-lets-track-phishing-kits-to-give-to-research-community-raw-material-to-stud/20%Monthly2020-08-08 15:15
https://hacker-gadgets.com/blog/2020/08/08/festin-s3-bucket-weakness-discovery/20%Monthly2020-08-08 00:09
https://hacker-gadgets.com/blog/2020/08/07/chalumeau-automated-extendable-and-customizable-credential-dumping-tool/20%Monthly2020-08-07 14:04
https://hacker-gadgets.com/blog/2020/08/06/gtunnel-a-robust-tunelling-solution-written-in-golang/20%Monthly2020-08-06 22:59
https://hacker-gadgets.com/blog/2020/08/06/taowu-a-cobaltstrike-toolkit/20%Monthly2020-08-06 12:57
https://hacker-gadgets.com/blog/2020/08/05/uefi_retool-a-tool-for-uefi-firmware-reverse-engineering/20%Monthly2020-08-05 21:54
https://hacker-gadgets.com/blog/2020/08/05/netenum-a-tool-to-passively-discover-active-hosts-on-a-network/20%Monthly2020-08-05 16:52
https://hacker-gadgets.com/blog/2020/08/05/dlinjector-gui-dll-injector-graphical-user-interface/20%Monthly2020-08-05 01:48
https://hacker-gadgets.com/blog/2020/08/04/xeca-powershell-payload-generator/20%Monthly2020-08-04 15:46
https://hacker-gadgets.com/blog/2020/08/04/cnitch-container-snitch-checks-running-processes-under-the-docker-engine-and-alerts-if-any-are-found-to-be-running-as-root/20%Monthly2020-08-04 00:43
https://hacker-gadgets.com/blog/2020/08/03/mistica-an-open-source-swiss-army-knife-for-arbitrary-communication-over-application-protocols/20%Monthly2020-08-03 14:39
https://hacker-gadgets.com/blog/2020/08/02/deimosc2-a-golang-command-and-control-framework-for-post-exploitation/20%Monthly2020-08-02 23:31
https://hacker-gadgets.com/blog/2020/08/02/eternalbluec-eternalblue-suite-remade-in-c-c-which-includes-ms17-010-exploit-eternalblue-vulnerability-detector-doublepulsar-detector-and-doublepulsar-shellcode-dll-uploader/20%Monthly2020-08-02 13:25
https://hacker-gadgets.com/blog/2020/08/01/cwff-create-your-custom-wordlist-for-fuzzing/20%Monthly2020-08-01 22:16
https://hacker-gadgets.com/blog/2020/08/01/cloudsplaining-an-aws-iam-security-assessment-tool-that-identifies-violations-of-least-privilege-and-generates-a-risk-prioritized-report/20%Monthly2020-08-01 17:15
https://hacker-gadgets.com/blog/2020/08/01/kubei-a-flexible-kubernetes-runtime-scanner/20%Monthly2020-08-01 02:12