XML Sitemap

This is a XML Sitemap which is supposed to be processed by search engines which follow the XML Sitemap standard like Ask.com, Bing, Google and Yahoo.
It was generated using the WordPress content management system and the XML Sitemap Generator Plugin by Auctollo.
You can find more information about XML sitemaps on sitemaps.org and Google's list of sitemap programs.

URLPriorityChange frequencyLast modified (GMT)
https://hacker-gadgets.com/blog/2022/01/31/recoverpy-interactively-find-and-recover-deleted-or-overwritten-files-from-your-terminal/20%Monthly2022-01-31 20:39
https://hacker-gadgets.com/blog/2022/01/31/bluffy-convert-shellcode-into-different-formats/20%Monthly2022-01-31 15:37
https://hacker-gadgets.com/blog/2022/01/31/kerbrute-an-script-to-perform-kerberos-bruteforcing-by-using-impacket/20%Monthly2022-01-31 00:35
https://hacker-gadgets.com/blog/2022/01/30/crt-crowdstrike-reporting-tool-for-azure/20%Monthly2022-01-30 14:31
https://hacker-gadgets.com/blog/2022/01/28/mininode-a-cli-tool-to-reduce-the-attack-surface-of-the-node-js-applications-by-using-static-analysis/20%Monthly2022-01-28 22:22
https://hacker-gadgets.com/blog/2022/01/28/combobulator-framework-to-detect-and-prevent-dependency-confusion-leakage-and-potential-attacks/20%Monthly2022-01-28 12:20
https://hacker-gadgets.com/blog/2022/01/27/gh-dork-github-dorking-tool/20%Monthly2022-01-27 21:18
https://hacker-gadgets.com/blog/2022/01/27/bloodyad-an-active-directory-privilege-escalation-framework/20%Monthly2022-01-27 16:17
https://hacker-gadgets.com/blog/2022/01/27/ninjasworkout-vulnerable-nodejs-web-application/20%Monthly2022-01-27 01:14
https://hacker-gadgets.com/blog/2022/01/26/xolo-tool-to-crawl-visualize-and-interact-with-sql-server-links-in-a-d3-graph/20%Monthly2022-01-26 15:12
https://hacker-gadgets.com/blog/2022/01/26/dontgo403-tool-to-bypass-40x-response-codes/20%Monthly2022-01-26 05:10
https://hacker-gadgets.com/blog/2022/01/25/fact-a-tool-to-collect-process-and-visualise-forensic-data-from-clusters-of-machines-running-in-the-cloud-or-on-premise/20%Monthly2022-01-25 14:06
https://hacker-gadgets.com/blog/2022/01/24/http2smugl-tool-to-detect-and-exploit-http-request-smuggling-in-cases-it-can-be-achieved-via-http-2-http-1-1-conversion/20%Monthly2022-01-24 23:04
https://hacker-gadgets.com/blog/2022/01/24/vulnlab-a-web-vulnerability-lab-project/20%Monthly2022-01-24 13:01
https://hacker-gadgets.com/blog/2022/01/23/whatfiles-log-what-files-are-accessed-by-any-linux-process/20%Monthly2022-01-23 21:58
https://hacker-gadgets.com/blog/2022/01/23/second-order-subdomain-takeover-scanner/20%Monthly2022-01-23 11:56
https://hacker-gadgets.com/blog/2022/01/22/mandiant-azure-ad-investigator-powershell-module-for-detecting-artifacts-that-may-be-indicators-of-unc2452-and-other-threat-actor-activity/20%Monthly2022-01-22 20:52
https://hacker-gadgets.com/blog/2022/01/22/pwndora-massive-ipv4-scanner-find-and-analyze-internet-connected-devices-in-minutes-create-your-own-iot-search-engine-at-home/20%Monthly2022-01-22 15:52
https://hacker-gadgets.com/blog/2022/01/22/t-reqs-http-fuzzer-a-grammar-based-http-fuzzer/20%Monthly2022-01-22 00:50
https://hacker-gadgets.com/blog/2022/01/21/wireshark-forensics-plugin-a-cross-platform-wireshark-plugin-that-correlates-network-traffic-data-with-threat-intelligence-asset-categorization-vulnerability-data/20%Monthly2022-01-21 14:48
https://hacker-gadgets.com/blog/2022/01/20/dep-scan-fully-open-source-security-audit-for-project-dependencies-based-on-known-vulnerabilities-and-advisories-supports-both-local-repos-and-container-images-integrates-with-various-ci-environme/20%Monthly2022-01-20 13:42
https://hacker-gadgets.com/blog/2022/01/19/http-desync-guardian-analyze-http-requests-to-minimize-risks-of-http-desync-attacks-precursor-for-http-request-smuggling-splitting/20%Monthly2022-01-19 22:38
https://hacker-gadgets.com/blog/2022/01/19/pip-audit-audits-python-environments-and-dependency-trees-for-known-vulnerabilities/20%Monthly2022-01-19 12:36
https://hacker-gadgets.com/blog/2022/01/18/gocabrito-super-organized-and-flexible-script-for-sending-phishing-campaigns/20%Monthly2022-01-18 21:32
https://hacker-gadgets.com/blog/2022/01/18/driftwood-private-key-usage-verification/20%Monthly2022-01-18 11:30
https://hacker-gadgets.com/blog/2022/01/18/reflutter-flutter-reverse-engineering-framework/20%Monthly2022-01-18 01:28
https://hacker-gadgets.com/blog/2022/01/17/inject-assembly-inject-net-assemblies-into-an-existing-process/20%Monthly2022-01-17 15:26
https://hacker-gadgets.com/blog/2022/01/17/registry-spy-cross-platform-registry-browser-for-raw-windows-registry-files/20%Monthly2022-01-17 00:24
https://hacker-gadgets.com/blog/2022/01/16/tokenuniverse-an-advanced-tool-for-working-with-access-tokens-and-windows-security-policy/20%Monthly2022-01-16 14:22
https://hacker-gadgets.com/blog/2022/01/15/iptable_evil-an-evil-bit-backdoor-for-iptables/20%Monthly2022-01-15 23:20
https://hacker-gadgets.com/blog/2022/01/15/narthex-modular-personalized-dictionary-generator/20%Monthly2022-01-15 13:17
https://hacker-gadgets.com/blog/2022/01/14/espoofer-an-email-spoofing-testing-tool-that-aims-to-bypass-spf-dkim-dmarc-and-forge-dkim-signatures/20%Monthly2022-01-14 22:13
https://hacker-gadgets.com/blog/2022/01/14/raven-advanced-cyber-threat-map-simplified-customizable-responsive/20%Monthly2022-01-14 12:11
https://hacker-gadgets.com/blog/2022/01/13/alphagolang-idapython-scripts-for-analyzing-golang-binaries/20%Monthly2022-01-13 21:08
https://hacker-gadgets.com/blog/2022/01/13/scemu-x86-32bits-emulator-for-securely-emulating-shellcodes/20%Monthly2022-01-13 16:06
https://hacker-gadgets.com/blog/2022/01/13/wifi-framework-wi-fi-framework-for-creating-proof-of-concepts-automated-experiments-test-suites-fuzzers-and-more/20%Monthly2022-01-13 01:03
https://hacker-gadgets.com/blog/2022/01/12/raudi-a-repo-to-automatically-generate-and-keep-updated-a-series-of-docker-images-through-github-actions/20%Monthly2022-01-12 15:01
https://hacker-gadgets.com/blog/2022/01/11/spoofthatmail-bash-script-to-check-if-a-domain-or-list-of-domains-can-be-spoofed-based-in-dmarc-records/20%Monthly2022-01-11 23:59
https://hacker-gadgets.com/blog/2022/01/11/wannarace-webapp-intentionally-made-vulnerable-to-race-condition-for-practicing-race-condition/20%Monthly2022-01-11 13:56
https://hacker-gadgets.com/blog/2022/01/10/pastemonitor-scrape-pastebin-api-to-collect-daily-pastes-setup-a-wordlist-and-be-alerted-by-email-when-you-have-a-match/20%Monthly2022-01-10 22:52
https://hacker-gadgets.com/blog/2022/01/10/lacheck-multithreaded-c-net-assembly-local-administrative-privilege-enumeration/20%Monthly2022-01-10 12:51
https://hacker-gadgets.com/blog/2022/01/09/shellcode-encryptor-a-simple-shell-code-encryptor-decryptor-executor-to-bypass-anti-virus/20%Monthly2022-01-09 21:47
https://hacker-gadgets.com/blog/2022/01/09/rclocals-linux-startup-analyzer/20%Monthly2022-01-09 11:46
https://hacker-gadgets.com/blog/2022/01/07/mortar-evasion-technique-to-defeat-and-divert-detection-and-prevention-of-security-products-av-edr-xdr/20%Monthly2022-01-07 14:31
https://hacker-gadgets.com/blog/2022/01/06/log4j-detect-script-to-detect-the-log4j-java-library-vulnerability-cve-2021-44228-for-a-list-of-urls-with-multithreading/20%Monthly2022-01-06 13:27
https://hacker-gadgets.com/blog/2022/01/04/rustpad-multi-threaded-padding-oracle-attacks-against-any-service/20%Monthly2022-01-04 21:18
https://hacker-gadgets.com/blog/2022/01/04/syntheticsun-a-defense-in-depth-security-automation-and-monitoring-framework-which-utilizes-threat-intelligence-machine-learning-managed-aws-security-services-and-serverless-technologies-to-conti/20%Monthly2022-01-04 16:15
https://hacker-gadgets.com/blog/2022/01/04/rpc-firewall-stopping-lateral-movement-via-the-rpc-firewall/20%Monthly2022-01-04 01:11
https://hacker-gadgets.com/blog/2022/01/03/msmailprobe-office-365-and-exchange-enumeration/20%Monthly2022-01-03 15:09
https://hacker-gadgets.com/blog/2022/01/03/lsarelayx-ntlm-relaying-for-windows-made-easy/20%Monthly2022-01-03 00:06
https://hacker-gadgets.com/blog/2022/01/02/riotpot-resilient-iot-and-operational-technology-honeypot/20%Monthly2022-01-02 14:04
https://hacker-gadgets.com/blog/2022/01/01/skrull-a-malware-drm-that-prevents-automatic-sample-submission-by-av-edr-and-signature-scanning-from-kernel/20%Monthly2022-01-01 23:02
https://hacker-gadgets.com/blog/2022/01/01/pmat-labs-labs-for-practical-malware-analysis-and-triage/20%Monthly2022-01-01 13:01