Day of Exploits

  • Home
  • Day of Exploits

Day of Exploits 💻 GitHub Dev | 🕵️‍♂️ Cyber Investigator
💼 Open to Paid Collabs
📚 Learning Pentesting & Bug Bounties
✨ Code & Security | Follow My Journey😉
(1)

wifite2Rewrite of the popular wireless network auditor, "wifite"All content shared is strictly for educational and aware...
18/09/2025

wifite2

Rewrite of the popular wireless network auditor, "wifite"

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

,

zirikatuFud Payload generator scriptAll content shared is strictly for educational and awareness purposes. I do not prom...
17/09/2025

zirikatu

Fud Payload generator script

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

NetExecThe Network Ex*****on ToolAll content shared is strictly for educational and awareness purposes. I do not promote...
16/09/2025

NetExec

The Network Ex*****on Tool

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

bulk_extractorbulk_extractor is a high-performance digital forensics tool that quickly scans disks, files, or directorie...
15/09/2025

bulk_extractor

bulk_extractor is a high-performance digital forensics tool that quickly scans disks, files, or directories to extract data like emails, credit card numbers, JPEGs, and JSON snippets—without relying on file system structures. It also generates histograms of features (e.g., search terms, email addresses) useful in investigations. Unlike traditional tools, it analyzes every byte, recursively decoding compressed or encoded data, enabling it to uncover artifacts (like BASE64-encoded JPEGs) that others miss.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

CrackMapExecA swiss army knife for pentesting networks (This project is no longer mantained due to the existence of a ho...
14/09/2025

CrackMapExec

A swiss army knife for pentesting networks (This project is no longer mantained due to the existence of a hostile fork)

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

minicomMinicom is a clone of the MS-DOS “Telix” communication program. It emulates ANSI and VT102 terminals, has a diali...
12/09/2025

minicom

Minicom is a clone of the MS-DOS “Telix” communication program. It emulates ANSI and VT102 terminals, has a dialing directory and auto zmodem download.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

🐉 iansians is the "swiss army knife" of hacking, perfect for a variety of tactical operationsAll content shared is stric...
11/09/2025

🐉 ians

ians is the "swiss army knife" of hacking, perfect for a variety of tactical operations

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

hashdeepThis is md5deep, a set of cross-platform tools to compute hashes, or message digests, for any number of files wh...
10/09/2025

hashdeep

This is md5deep, a set of cross-platform tools to compute hashes, or message digests, for any number of files while optionally recursively digging through the directory structure. It can also take a list of known hashes and display the filenames of input files whose hashes either do or do not match any of the known hashes. This version supports MD5, SHA-1, SHA-256, Tiger, and Whirlpool hashes.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

bettercapbettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security...
09/09/2025

bettercap

bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, CAN-bus, wireless HID devices and Ethernet networks.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

macchangerGNU MAC Changer is an utility that makes the maniputation of MAC addresses of network interfaces easier.All co...
08/09/2025

macchanger

GNU MAC Changer is an utility that makes the maniputation of MAC addresses of network interfaces easier.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

metasploit-frameworkThe world’s most used pe*******on testing frameworkKnowledge is power, especially when it’s shared. ...
07/09/2025

metasploit-framework

The world’s most used pe*******on testing framework

Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

netsniff-ngA Swiss army knife for your daily Linux network plumbing.All content shared is strictly for educational and a...
05/09/2025

netsniff-ng

A Swiss army knife for your daily Linux network plumbing.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

Address


Website

Alerts

Be the first to know and let us send you an email when Day of Exploits posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Day of Exploits:

  • Want your business to be the top-listed Media Company?

Share