Day of Exploits

  • Home
  • Day of Exploits

Day of Exploits 💻 GitHub Dev | 🕵️‍♂️ Cyber Investigator
💼 Open to Paid Collabs
📚 Learning Pentesting & Bug Bounties
✨ Code & Security | Follow My Journey😉
(2)

🦝 Raccoon- PPM Image Manipulation LibraryRaccoon is a lightweight and efficient C++ library for working with PPM (Portab...
09/07/2025

🦝 Raccoon- PPM Image Manipulation Library

Raccoon is a lightweight and efficient C++ library for working with PPM (Portable Pixmap) image files. It allows you to easily load, modify, and create PPM images while providing a set of tools for inserting geometric shapes into your images. Additionally, the library comes with a handy command-line utility to make image manipulation even more accessible!

✨ Features

Read PPM images: Load PPM files effortlessly into your application
Modify Images: Perform image editing operations with ease
Insert Geometric Shapes: Add lines, rectangles, circles, and more directly into your images
Command-Line Utility: Use the library directly from the command line for quick tasks

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

BLE-Name-ExploitorScript that write/updates Device Local Name of BLE devices like smart watches & others.Current Vulnera...
08/07/2025

BLE-Name-Exploitor

Script that write/updates Device Local Name of BLE devices like smart watches & others.

Current Vulnerable Devices that I discovered are-
Lenevo HX03
Boat Xtend
Boat STROM
Colorfit 2 Pro
GOQii Smart Vital
Fastrack reflex 2.0
More will be updated...

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

07/07/2025

Hi everyone! 🌟 You can support me by sending Stars – they help me earn money to keep making content that you love.

Whenever you see the Stars icon, you can send me Stars.

safestaDangerous Functions FinderAll content shared is strictly for educational and awareness purposes. I do not promote...
07/07/2025

safesta

Dangerous Functions Finder

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

SQL-Injection-FinderAutomating the SQL Injection through Google dorks.All content shared is strictly for educational and...
06/07/2025

SQL-Injection-Finder

Automating the SQL Injection through Google dorks.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

🔍 XReconAutomated Subdomain Reconnaissance ToolXRecon is simple but powerful subdomain enumeration tool built for bug bo...
05/07/2025

🔍 XRecon

Automated Subdomain Reconnaissance Tool

XRecon is simple but powerful subdomain enumeration tool built for bug bounty hunters, pe*******on testers, and cybersecurity researchers. It automates the process of discovering subdomains and checking which ones are live, helping you save time in recon.

🚀 Why Use XRecon?

Beginner-Friendly: No complex setups. Just run and get results.
Accurate Results: Combines multiple trusted tools like assetfinder, subfinder, and httpx.
Saves Time: Automates enumeration and filtering — no more running tools one by one.
Organized Output: Saves all results in neat folders with separate files for raw and live subdomains.
Fast and Lightweight: Uses passive methods only (safe for stealthy recon).
🐱‍💻 Perfect for Bug Bounty & OSINT Workflows

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

WiFiSuiteAll content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourag...
04/07/2025

WiFiSuite

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

RadareEyeTool for especially scanning nearby devices and execute a given command on its own system while the target devi...
03/07/2025

RadareEye

Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

RDPloitRDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop ProtocolAll content shared is strictly for...
02/07/2025

RDPloit

RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

LazyAircrackThe main purpose of the tool is automating wifi attack. It is a automated bash script. Crack the four way ha...
01/07/2025

LazyAircrack

The main purpose of the tool is automating wifi attack. It is a automated bash script. Crack the four way handshake and get into the network.

1.Wifi Hacking: Get all the wireless traffic around you listed, select the victim and crack the password using handshake packet. The by default dictionary for cracking passowrd is rockyou.txt from linux, don't forget to replace it with your custom dictionary.

2.Wifi Jammer: It creates denial of service (DoS) condition against any wifi router by continously sending the deauthentication packets resulting in disrupted connection of all connected users to it.

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

carpunk 🚗Carpunk is an advanced CAN Injection Toolkit, evolving from the original CANghost. It introduces new functional...
30/06/2025

carpunk 🚗

Carpunk is an advanced CAN Injection Toolkit, evolving from the original CANghost. It introduces new functionalities, including interface control, basic sniffing, and CAN Injection vulnerabilities.

✅ Compatible with both Simulation & Real Cars
🛠️ Added Two New CAN Injection Attacks
🧪 Tested on Ubuntu and Parrot OS

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , ,

Lazy-HunterLazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and C...
29/06/2025

Lazy-Hunter

LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable laws.

Follow for more upcoming interesting Topics or to learn about the tools that were using in offensive journey Thanks☠

, , , , , , , , , , ,

Address


Website

Alerts

Be the first to know and let us send you an email when Day of Exploits posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Day of Exploits:

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share