XML Sitemap

This is a XML Sitemap which is supposed to be processed by search engines which follow the XML Sitemap standard like Ask.com, Bing, Google and Yahoo.
It was generated using the WordPress content management system and the XML Sitemap Generator Plugin by Auctollo.
You can find more information about XML sitemaps on sitemaps.org and Google's list of sitemap programs.

URLPriorityChange frequencyLast modified (GMT)
https://hacker-gadgets.com/blog/2022/05/31/k0otkit-universal-post-penetration-technique-which-could-be-used-in-penetrations-against-kubernetes-clusters/20%Monthly2022-05-31 15:50
https://hacker-gadgets.com/blog/2022/05/31/labtainers-a-docker-based-cyber-lab-framework/20%Monthly2022-05-31 00:44
https://hacker-gadgets.com/blog/2022/05/30/persistbof-tool-to-help-automate-common-persistence-mechanisms/20%Monthly2022-05-30 14:41
https://hacker-gadgets.com/blog/2022/05/29/mitmproxy2swagger-automagically-reverse-engineer-rest-apis-via-capturing-traffic/20%Monthly2022-05-29 23:39
https://hacker-gadgets.com/blog/2022/05/29/hakoriginfinder-tool-for-discovering-the-origin-host-behind-a-reverse-proxy-useful-for-bypassing-cloud-wafs/20%Monthly2022-05-29 13:35
https://hacker-gadgets.com/blog/2022/05/28/binabsinspector-vulnerability-scanner-for-binaries/20%Monthly2022-05-28 22:32
https://hacker-gadgets.com/blog/2022/05/28/stunner-tool-to-test-and-exploit-stun-turn-and-turn-over-tcp-servers/20%Monthly2022-05-28 12:31
https://hacker-gadgets.com/blog/2022/05/28/leaf-linux-evidence-acquisition-framework/20%Monthly2022-05-28 02:29
https://hacker-gadgets.com/blog/2022/05/27/ransomware-simulator-ransomware-simulator-written-in-golang/20%Monthly2022-05-27 16:27
https://hacker-gadgets.com/blog/2022/05/27/pocsploit-a-lightweight-flexible-and-novel-open-source-poc-verification-framework/20%Monthly2022-05-27 01:24
https://hacker-gadgets.com/blog/2022/05/26/findfunc-advanced-filtering-finding-of-functions-in-ida-pro/20%Monthly2022-05-26 15:22
https://hacker-gadgets.com/blog/2022/05/26/frida-ios-hook-a-tool-that-helps-you-easy-trace-classes-functions-and-modify-the-return-values-of-methods-on-ios-platform/20%Monthly2022-05-26 00:19
https://hacker-gadgets.com/blog/2022/05/25/droiddetective-a-machine-learning-malware-analysis-framework-for-android-apps/20%Monthly2022-05-25 14:17
https://hacker-gadgets.com/blog/2022/05/25/reposaur-the-open-source-compliance-tool-for-development-platforms/20%Monthly2022-05-25 04:16
https://hacker-gadgets.com/blog/2022/05/24/tornado-anonymously-reverse-shell-over-tor-network-using-hidden-services-without-portforwarding/20%Monthly2022-05-24 23:14
https://hacker-gadgets.com/blog/2022/05/23/frelatage-the-python-fuzzer-that-the-world-deserves/20%Monthly2022-05-23 22:10
https://hacker-gadgets.com/blog/2022/05/23/findwall-check-if-your-provider-is-blocking-you/20%Monthly2022-05-23 17:09
https://hacker-gadgets.com/blog/2022/05/23/redteam-physical-tools-red-team-toolkit-a-curated-list-of-tools-that-are-commonly-used-in-the-field-for-physical-security-red-teaming-and-tactical-covert-entry/20%Monthly2022-05-23 02:06
https://hacker-gadgets.com/blog/2022/05/22/fb_friend_list_scraper-osint-tool-to-scrape-names-and-usernames-from-large-friend-lists-on-facebook-without-being-rate-limited/20%Monthly2022-05-22 16:05
https://hacker-gadgets.com/blog/2022/05/22/zphisher-gui-back_office-a-zphisher-gui-back-office-plugin/20%Monthly2022-05-22 01:01
https://hacker-gadgets.com/blog/2022/05/21/tetanus-mythic-c2-agent-targeting-linux-and-windows-hosts-written-in-rust/20%Monthly2022-05-21 14:59
https://hacker-gadgets.com/blog/2022/05/20/xepor-web-routing-framework-for-reverse-engineers-and-security-researchers-brings-the-best-of-mitmproxy-and-flask/20%Monthly2022-05-20 23:57
https://hacker-gadgets.com/blog/2022/05/20/octopus-open-source-pre-operation-c2-server-based-on-python-and-powershell/20%Monthly2022-05-20 13:54
https://hacker-gadgets.com/blog/2022/05/19/c2concealer-command-line-tool-that-generates-randomized-c2-malleable-profiles-for-use-in-cobalt-strike/20%Monthly2022-05-19 22:51
https://hacker-gadgets.com/blog/2022/05/19/powerproxy-powershell-socks-proxy-with-reverse-proxy-capabilities/20%Monthly2022-05-19 12:49
https://hacker-gadgets.com/blog/2022/05/18/cyph-cryptographically-secure-messaging-and-social-networking-service/20%Monthly2022-05-18 21:46
https://hacker-gadgets.com/blog/2022/05/18/shadowclone-unleash-the-power-of-cloud/20%Monthly2022-05-18 16:46
https://hacker-gadgets.com/blog/2022/05/18/grafiki-threat-hunting-tool-about-sysmon-and-graphs/20%Monthly2022-05-18 01:44
https://hacker-gadgets.com/blog/2022/05/17/vaas-verdict-as-a-service-sdks-analyze-files-for-malicious-content/20%Monthly2022-05-17 15:42
https://hacker-gadgets.com/blog/2022/05/17/kali-linux-2022-2-penetration-testing-and-ethical-hacking-linux-distribution/20%Monthly2022-05-17 05:39
https://hacker-gadgets.com/blog/2022/05/17/birduster-a-multi-threaded-python-script-designed-to-brute-force-directories-and-files-names-on-webservers/20%Monthly2022-05-17 00:38
https://hacker-gadgets.com/blog/2022/05/16/chlonium-chromium-cookie-import-export-tool/20%Monthly2022-05-16 14:36
https://hacker-gadgets.com/blog/2022/05/14/nodesecurityshield-a-developer-and-security-engineer-friendly-package-for-securing-nodejs-applications/20%Monthly2022-05-14 22:27
https://hacker-gadgets.com/blog/2022/05/14/bwasp-bob-web-application-security-project/20%Monthly2022-05-14 17:26
https://hacker-gadgets.com/blog/2022/05/14/rogueassemblyhunter-rogue-assembly-hunter-is-a-utility-for-discovering-interesting-net-clr-modules-in-running-processes/20%Monthly2022-05-14 02:23
https://hacker-gadgets.com/blog/2022/05/13/process_overwriting-yet-another-variant-of-process-hollowing/20%Monthly2022-05-13 16:21
https://hacker-gadgets.com/blog/2022/05/13/heyserial-programmatically-create-hunting-rules-for-deserialization-exploitation-with-multiple-keywords-gadget-chains-object-types-encodings-and-rule-types/20%Monthly2022-05-13 01:18
https://hacker-gadgets.com/blog/2022/05/12/ssoh-no-user-enumeration-and-password-spraying-tool-for-testing-azure-ad/20%Monthly2022-05-12 15:16
https://hacker-gadgets.com/blog/2022/05/12/duplicatedump-dumping-lsass-with-a-duplicated-handle-from-custom-lsa-plugin/20%Monthly2022-05-12 00:12
https://hacker-gadgets.com/blog/2022/05/11/kubeclarity-tool-for-detection-and-management-of-software-bill-of-materials-sbom-and-vulnerabilities-of-container-images-and-filesystems/20%Monthly2022-05-11 14:10
https://hacker-gadgets.com/blog/2022/05/10/spring4shell-poc-spring-core-rce-0-day-vulnerability/20%Monthly2022-05-10 23:06
https://hacker-gadgets.com/blog/2022/05/10/spring4shell-poc-dockerized-spring4shell-cve-2022-22965-poc-application-and-exploit/20%Monthly2022-05-10 13:03
https://hacker-gadgets.com/blog/2022/05/10/autoresponder-carbon-black-response-ir-tool/20%Monthly2022-05-10 03:02
https://hacker-gadgets.com/blog/2022/05/08/cve-tracker-with-the-help-of-this-automated-script-you-will-never-lose-track-of-recently-released-cves/20%Monthly2022-05-08 15:54
https://hacker-gadgets.com/blog/2022/05/08/zi-a-swiss-army-knife-for-zsh-unix-shell/20%Monthly2022-05-08 00:51
https://hacker-gadgets.com/blog/2022/05/07/gosh-golang-reverse-bind-shell-generator/20%Monthly2022-05-07 14:49
https://hacker-gadgets.com/blog/2022/05/06/email-prediction-asterisks-script-that-allows-you-to-identify-the-emails-hidden-behind-asterisks/20%Monthly2022-05-06 23:47
https://hacker-gadgets.com/blog/2022/05/06/pezor-docker-with-the-help-of-this-docker-image-you-can-easily-access-pezor-on-your-system/20%Monthly2022-05-06 13:45
https://hacker-gadgets.com/blog/2022/05/05/malicious-pdf-generate-a-bunch-of-malicious-pdf-files-with-phone-home-functionality/20%Monthly2022-05-05 22:42
https://hacker-gadgets.com/blog/2022/05/05/graphql-threat-matrix-graphql-threat-framework-used-by-security-professionals-to-research-security-gaps-in-graphql-implementations/20%Monthly2022-05-05 12:40
https://hacker-gadgets.com/blog/2022/05/04/cliam-multi-cloud-iam-permissions-enumeration-tool/20%Monthly2022-05-04 21:37
https://hacker-gadgets.com/blog/2022/05/04/ldapfragger-command-and-control-tool-that-enables-attackers-to-route-cobalt-strike-beacon-data-over-ldap/20%Monthly2022-05-04 16:36
https://hacker-gadgets.com/blog/2022/05/04/leakedhandlesfinder-leaked-windows-processes-handles-identification-tool/20%Monthly2022-05-04 01:33
https://hacker-gadgets.com/blog/2022/05/03/firmwire-b-full-system-baseband-firmware-emulation-platform-for-fuzzing-debugging-and-root-cause-analysis-of-smartphone-baseband-firmwares/20%Monthly2022-05-03 15:31
https://hacker-gadgets.com/blog/2022/05/03/pybatfish-python-client-for-batfish-network-configuration-analysis-tool/20%Monthly2022-05-03 00:28
https://hacker-gadgets.com/blog/2022/05/02/moonwalk-cover-your-tracks-during-linux-exploitation-by-leaving-zero-traces-on-system-logs-and-filesystem-timestamps/20%Monthly2022-05-02 14:25
https://hacker-gadgets.com/blog/2022/05/01/nanodump-a-crappy-lsass-dumper-with-no-ascii-art/20%Monthly2022-05-01 23:21
https://hacker-gadgets.com/blog/2022/05/01/backupoperatortoda-from-an-account-member-of-the-group-backup-operators-to-domain-admin-without-rdp-or-winrm-on-the-domain-controller/20%Monthly2022-05-01 13:19