XML Sitemap

This is a XML Sitemap which is supposed to be processed by search engines which follow the XML Sitemap standard like Ask.com, Bing, Google and Yahoo.
It was generated using the WordPress content management system and the Google Sitemap Generator Plugin by Arne Brachhold.
You can find more information about XML sitemaps on sitemaps.org and Google's list of sitemap programs.

URLPriorityChange frequencyLast modified (GMT)
https://hacker-gadgets.com/blog/2021/08/31/fpicker-a-frida-based-fuzzing-suite-supporting-various-modes-including-afl-in-process-fuzzing/20%Monthly2021-08-31 23:29
https://hacker-gadgets.com/blog/2021/08/31/keyhacks-a-repository-which-shows-quick-ways-in-which-api-keys-leaked-by-a-bug-bounty-program-can-be-checked-to-see-if-theyre-valid/20%Monthly2021-08-31 13:27
https://hacker-gadgets.com/blog/2021/08/30/reg1c1de-registry-permission-scanner-for-finding-potential-privesc-avenues-within-registry/20%Monthly2021-08-30 22:24
https://hacker-gadgets.com/blog/2021/08/30/speakeasy-windows-kernel-and-user-mode-emulation/20%Monthly2021-08-30 17:23
https://hacker-gadgets.com/blog/2021/08/30/pezor-open-source-shellcode-and-pe-packer/20%Monthly2021-08-30 02:20
https://hacker-gadgets.com/blog/2021/08/29/meat-this-toolkit-aims-to-help-forensicators-perform-different-kinds-of-acquisitions-on-ios-devices/20%Monthly2021-08-29 16:18
https://hacker-gadgets.com/blog/2021/08/29/huan-encrypted-pe-loader-generator/20%Monthly2021-08-29 01:14
https://hacker-gadgets.com/blog/2021/08/28/pantagrule-large-hashcat-rulesets-generated-from-real-world-compromised-passwords/20%Monthly2021-08-28 15:12
https://hacker-gadgets.com/blog/2021/08/28/ctf-screenshotter-a-ctf-web-challenge-about-making-screenshots/20%Monthly2021-08-28 00:10
https://hacker-gadgets.com/blog/2021/08/27/adalanche-active-directory-acl-visualizer-and-explorer/20%Monthly2021-08-27 14:08
https://hacker-gadgets.com/blog/2021/08/26/beaconeye-hunts-out-cobaltstrike-beacons-and-logs-operator-command-output/20%Monthly2021-08-26 23:05
https://hacker-gadgets.com/blog/2021/08/26/dorkify-perform-google-dork-search/20%Monthly2021-08-26 13:03
https://hacker-gadgets.com/blog/2021/08/25/slsa-supply-chain-levels-for-software-artifacts/20%Monthly2021-08-25 21:59
https://hacker-gadgets.com/blog/2021/08/25/pspkiaudit-powershell-toolkit-for-auditing-active-directory-certificate-services-ad-cs/20%Monthly2021-08-25 16:58
https://hacker-gadgets.com/blog/2021/08/25/dnsmonster-passive-dns-capture-monitoring-framework/20%Monthly2021-08-25 01:56
https://hacker-gadgets.com/blog/2021/08/24/git-secret-go-scripts-for-finding-an-api-key-some-keywords-in-repository/20%Monthly2021-08-24 15:54
https://hacker-gadgets.com/blog/2021/08/24/lazysign-create-fake-certs-for-binaries-using-windows-binaries-and-the-power-of-bat-files/20%Monthly2021-08-24 00:51
https://hacker-gadgets.com/blog/2021/08/23/process-dump-windows-tool-for-dumping-malware-pe-files-from-memory-back-to-disk-for-analysis/20%Monthly2021-08-23 14:49
https://hacker-gadgets.com/blog/2021/08/22/keimpx-check-for-valid-credentials-across-a-network-over-smb/20%Monthly2021-08-22 23:46
https://hacker-gadgets.com/blog/2021/08/22/sqlancer-detecting-logic-bugs-in-dbms/20%Monthly2021-08-22 13:44
https://hacker-gadgets.com/blog/2021/08/21/xlmmacrodeobfuscator-extract-and-deobfuscate-xlm-macros-a-k-a-excel-4-0-macros/20%Monthly2021-08-21 22:41
https://hacker-gadgets.com/blog/2021/08/21/brutus-an-educational-exploitation-framework-shipped-on-a-modular-and-highly-extensible-multi-tasking-and-multi-processing-architecture/20%Monthly2021-08-21 12:39
https://hacker-gadgets.com/blog/2021/08/20/packagedna-tool-to-analyze-software-packages-of-different-programming-languages-that-are-being-or-will-be-used-in-their-codes/20%Monthly2021-08-20 21:35
https://hacker-gadgets.com/blog/2021/08/20/fisherman-cli-program-that-collects-information-from-facebook-user-profiles-via-selenium/20%Monthly2021-08-20 16:34
https://hacker-gadgets.com/blog/2021/08/20/rew-sploit-emulate-and-dissect-msf-and-other-attacks/20%Monthly2021-08-20 01:31
https://hacker-gadgets.com/blog/2021/08/19/allstar-github-app-to-set-and-enforce-security-policies/20%Monthly2021-08-19 15:29
https://hacker-gadgets.com/blog/2021/08/19/jsleak-a-go-code-to-detect-leaks-in-js-files-via-regex-patterns/20%Monthly2021-08-19 00:26
https://hacker-gadgets.com/blog/2021/08/18/auraborealisapp-do-you-know-whats-in-your-python-packages-a-tool-for-visualizing-python-package-registry-security-audit-data/20%Monthly2021-08-18 14:24
https://hacker-gadgets.com/blog/2021/08/17/sgxray-automating-vulnerability-detection-for-sgx-apps/20%Monthly2021-08-17 23:21
https://hacker-gadgets.com/blog/2021/08/17/reversessh-statically-linked-ssh-server-with-reverse-shell-functionality-for-ctfs-and-such/20%Monthly2021-08-17 13:19
https://hacker-gadgets.com/blog/2021/08/16/picklec2-a-post-exploitation-and-lateral-movements-framework/20%Monthly2021-08-16 22:16
https://hacker-gadgets.com/blog/2021/08/16/camphish-grab-cam-shots-from-targets-phone-front-camera-or-pc-webcam-just-sending-a-link/20%Monthly2021-08-16 17:15
https://hacker-gadgets.com/blog/2021/08/16/raider-web-authentication-testing-framework/20%Monthly2021-08-16 02:11
https://hacker-gadgets.com/blog/2021/08/15/tko-subs-a-tool-that-can-help-detect-and-takeover-subdomains-with-dead-dns-records/20%Monthly2021-08-15 16:09
https://hacker-gadgets.com/blog/2021/08/15/bantam-a-php-backdoor-management-and-generation-tool-c2-featuring-end-to-end-encrypted-payload-streaming-designed-to-bypass-waf-ids-siem-systems/20%Monthly2021-08-15 01:05
https://hacker-gadgets.com/blog/2021/08/14/ninjadroid-ninja-reverse-engineering-on-android-apk-packages/20%Monthly2021-08-14 15:03
https://hacker-gadgets.com/blog/2021/08/14/nimplant-a-cross-platform-implant-written-in-nim/20%Monthly2021-08-14 00:00
https://hacker-gadgets.com/blog/2021/08/13/jwtxploiter-a-tool-to-test-security-of-json-web-token/20%Monthly2021-08-13 13:58
https://hacker-gadgets.com/blog/2021/08/12/http-request-smuggling-http-request-smuggling-detection-tool/20%Monthly2021-08-12 22:55
https://hacker-gadgets.com/blog/2021/08/12/alanframework-a-post-exploitation-framework/20%Monthly2021-08-12 12:52
https://hacker-gadgets.com/blog/2021/08/11/wsh-web-shell-generator-and-command-line-interface/20%Monthly2021-08-11 21:49
https://hacker-gadgets.com/blog/2021/08/11/jarm-active-transport-layer-security-tls-server-fingerprinting-tool/20%Monthly2021-08-11 16:48
https://hacker-gadgets.com/blog/2021/08/11/karton-distributed-malware-processing-framework-based-on-python-redis-and-minio/20%Monthly2021-08-11 01:45
https://hacker-gadgets.com/blog/2021/08/10/unhookme-an-universal-windows-api-resolver-and-unhooker-addressing-problem-of-invoking-unmonitored-system-calls-from-within-of-your-red-teams-malware/20%Monthly2021-08-10 15:43
https://hacker-gadgets.com/blog/2021/08/10/adcspwn-a-tool-to-escalate-privileges-in-an-active-directory-network-by-coercing-authenticate-from-machine-accounts-and-relaying-to-the-certificate-service/20%Monthly2021-08-10 00:40
https://hacker-gadgets.com/blog/2021/08/09/sigurlfind3r-a-reconnaissance-tool-it-fetches-urls-from-alienvaults-otx-common-crawl-urlscan-github-and-the-wayback-machine/20%Monthly2021-08-09 14:38
https://hacker-gadgets.com/blog/2021/08/08/php-jpeg-injector-injects-php-payloads-into-jpeg-images/20%Monthly2021-08-08 23:35
https://hacker-gadgets.com/blog/2021/08/08/solitude-a-privacy-analysis-tool-that-enables-anyone-to-conduct-their-own-privacy-investigations/20%Monthly2021-08-08 13:33
https://hacker-gadgets.com/blog/2021/08/07/go-shellcode-a-repository-of-windows-shellcode-runners-and-supporting-utilities/20%Monthly2021-08-07 22:31
https://hacker-gadgets.com/blog/2021/08/07/cthreadhijack-beacon-object-file-bof-for-remote-process-injection-via-thread-hijacking/20%Monthly2021-08-07 17:30
https://hacker-gadgets.com/blog/2021/08/07/twiti-tool-for-extracting-iocs-from-tweet/20%Monthly2021-08-07 02:27
https://hacker-gadgets.com/blog/2021/08/06/warcannon-high-speed-low-cost-commoncrawl-regexp-in-node-js/20%Monthly2021-08-06 16:25
https://hacker-gadgets.com/blog/2021/08/06/changetower-tool-to-help-you-watch-changes-in-webpages-and-get-notified-of-any-changes/20%Monthly2021-08-06 01:21
https://hacker-gadgets.com/blog/2021/08/05/elpscrk-an-intelligent-common-user-password-profiler-based-on-permutations-and-statistics/20%Monthly2021-08-05 15:19
https://hacker-gadgets.com/blog/2021/08/05/uchihash-a-small-utility-to-deal-with-malware-embedded-hashes/20%Monthly2021-08-05 00:16
https://hacker-gadgets.com/blog/2021/08/04/sharplaps-retrieve-laps-password-from-ldap/20%Monthly2021-08-04 14:13
https://hacker-gadgets.com/blog/2021/08/03/doldrums-a-flutter-dart-reverse-engineering-tool/20%Monthly2021-08-03 23:10
https://hacker-gadgets.com/blog/2021/08/03/rz-ghidra-deep-ghidra-decompiler-and-sleigh-disassembler-integration-for-rizin/20%Monthly2021-08-03 13:08
https://hacker-gadgets.com/blog/2021/08/02/domhttpx-a-google-search-engine-dorker-with-http-toolkit-built-with-python-can-make-it-easier-for-you-to-find-many-urls-ips-at-once-with-fast-time/20%Monthly2021-08-02 22:06
https://hacker-gadgets.com/blog/2021/08/02/powershellarmoury-a-powershell-armoury-for-security-guys-and-girls/20%Monthly2021-08-02 17:05
https://hacker-gadgets.com/blog/2021/08/02/tsharkvm-tshark-elk-analytics-virtual-machine/20%Monthly2021-08-02 02:01
https://hacker-gadgets.com/blog/2021/08/01/csirt-collect-powershell-script-to-collect-memory-and-triage-disk-forensics/20%Monthly2021-08-01 15:59
https://hacker-gadgets.com/blog/2021/08/01/cerbrutus-network-brute-force-tool-written-in-python/20%Monthly2021-08-01 00:56