cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

Tʀɪᴄᴋʏ Pᴇɴɢᴜɪɴ ( trickypenguin.ink )

⚡ Tʀɪᴄᴋʏ Pᴇɴɢᴜɪɴ ✅ ⚡ trickypenguin.ink

إظهار المزيد
لم يتم تحديد البلدالإنكليزية131 855التكنولوجيات والتطبيقات23 957
مشاركات الإعلانات
233
المشتركون
لا توجد بيانات24 ساعات
لا توجد بيانات7 أيام
+230 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

Photo unavailableShow in Telegram
Microsoft Threat Intelligence Security Tools #Python toolkit: Log Data Acquisition Data Enrichment Security Analysis Visualization Data Manipulation and Utility functions https://github.com/microsoft/msticpy Thanks for tip twitter.com/Dinosn
إظهار الكل...
إظهار الكل...
JIT.codes — Convert text to code with AI

Supercharge your coding with AI! Our platform harnesses the power of artificial intelligence and a thriving developer community to make coding faster and smarter.

🔥 3
إظهار الكل...
The Five Phases of Penetration Testing • trickypenguin.ink

Penetration testing is an important part of an organization's overall security strategy. By following the five phases of penetration testing, organizations

Photo unavailableShow in Telegram
HUMAN GENERATOR AI tool for creating fake photos of people with many options: - use uploaded face photo - age - gender - skin tone - etnicity - body type - pose - hair color - clothing style - background https://generated.photos/human-generator/
إظهار الكل...
👍 2
Android Hacking Applications 🔹zANTI 🔗https://www.zimperium.com/zanti-mobile-penetration-testing/ 🔹 Stryker 🔗 https://strykerdefence.com/ 🔹 ANDRAX 🔗 https://snakesec.info/ 🔹 Hijacker 🔗 https://github.com/chrisk44/Hijacker 🔹Termux 🔗 https://f-droid.org/packages/com.termux/ 🔹 WPSApp 🔗https://play.google.com/store/apps/details?id=com.themausoft.wpsapp 🔹WIFI WPS WPA TESTER 🔗https://play.google.com/store/apps/details?id=com.tester.wpswpatester 🔹HTTP Tools 🔗https://play.google.com/store/apps/details?id=com.cafelabs.curlme 🔹IOT Scanner 🔗https://play.google.com/store/apps/details?id=com.knabl.iotsecurityscanner 🔹Fing - Network Tools 🔗https://play.google.com/store/apps/details?id=com.overlook.android.fing 🔹Shodan 🔗https://play.google.com/store/apps/details?id=io.shodan.app 🔹PentestKit Mobile 🔗https://play.google.com/store/apps/details?id=com.pentestkit 🔹Vulners Scanner 🔗https://play.google.com/store/apps/details?id=com.vulners 🔹NetMan: Network Tools & Utils 🔗https://play.google.com/store/apps/details?id=com.eakteam.networkmanager.free 🔹nRF Connect for Mobile 🔗https://play.google.com/store/apps/details?id=no.nordicsemi.android.mcp 🔹BLE Sniffer 🔗https://play.google.com/store/apps/details?id=com.aconno.blesniffer 🔹Dorks - Hack 🔗https://play.google.com/store/apps/details?id=com.iam.googledork 🔹Intercepter - NG 🔗 http://sniff.su/ 🔹 Sniffer Wicap 🔗https://play.google.com/store/apps/details?id=com.evbadroid.wicapdemo 🔹Rucky 🔗https://store.nethunter.com/packages/com.mayank.rucky/ 🔹 WHID Injector 🔗https://store.nethunter.com/en/packages/whid.usb.injector/ 🔹WiGLE WiFi Wardriving 🔗https://play.google.com/store/apps/details?id=net.wigle.wigleandroid 🔹Arkhota 🔗https://github.com/ALW1EZ/Arkhota #infosec #cybersecurity #hacking #pentesting #security 📱 trickypenguin.t.me
إظهار الكل...
Penetration Testing for Mobile Applications Pentesting Toolkit | zANTI

Zimperium's zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button.

Face Real ESRGAN A tool to scale fuzzy faces in group photos by a factor of eight. Despite some distortions (which can be easily corrected in any online image editor), this is one of the best scaling tools for working with faces. https://huggingface.co/spaces/doevent/Face-Real-ESRGAN
إظهار الكل...
Photo unavailableShow in Telegram
Plate Recognizer Online tool to recognise number plates on blurred pictures. Sometimes it may not work accurately, but it is valuable for identifying the country when the flag is not visible. https://platerecognizer.com/
إظهار الكل...
إظهار الكل...
Exploring Honeypots in Cybersecurity: Types and Essentials for Learners • trickypenguin.ink

In the ever-evolving landscape of cybersecurity, innovative approaches are constantly sought to better understand and defend against threats. One such

4
Photo unavailableShow in Telegram
If you are investigating a #Twitter account, twosint can help you with its valuable modules. https://github.com/falkensmz/tw1tter0s1nt @trickypenguin #OSINT #SOCMINT #intelligence #investigation #BlueTeam #infosec #CTI #ThreatIntel #cybersecurity
إظهار الكل...
👍 1