Category Downloads

Stop searching for your cybersecurity and cyberwarfare tools – we have listed them all down in the awesome download section of cyberwarzone.com. The latest tools, the latest gadgets and scripts all on one page.

The tools which are available for download will help you to get a better understanding of environments, and it will also allow you to take quick action and get quicker results. The download category is definitely something you want to check out.

Free hacking footage

I have created some footage which you can use for free. The footage that I have created consists out of 3 hacking videos. The videos contain the word hacking, and the black background is covered one of the following colors:…

XDR security solutions and providers

XDR security solutions is big business, and I want to know, which XDR security solutions are available, and where I can find them. The term XDR comes from EDR, which stands for Endpoint Detection and Response, but of course, the…

Clone a voice in 5 seconds

If you want to clone a voice, you will know that it often requires collecting massive amounts of datasets that contain hours of recorded speech. These datasets then are used to train a new voice model, but with this Github…

Bulletproof hosting list (2020 version)

Cybercriminals, spammer, carders or worse make use of so-called ‘bulletproof hostings’. These hosting environments turn a blind eye to the activity of their users. This means, that the bulletproof server is allowed to perform port-scans, setup phishing pages, act as…

PayWall bypass tool trending in Github

One of the anti-paywall tools on Github is currently trending, the tool ‘bypass-paywalls-chrome’ has been posted on Github by iamadamdev. The tool allows it’s users to bypass over 100 Paywalls by simply installing the plugin into their browser. Sites which…

Twint: Twitter Intelligence Tool

A new tool named Twint allows users to scrape Twitter accounts for information without asking the user for any authentication. A different approach has also been included in the Twitter Intelligence Tool as Twint does not utilize the Twitter API.…

LaZagne: Recover passwords from browsers

Use LaZagne to see which passwords have been stored locally on your system. The LaZagne project is a quick open-source tool which allows you to recover and index all of the passwords on your system. LaZagne can recover passwords from:…

Nessus Vulnerability scanner

Nessus is a program with many features, however it is quite difficult to use and there are only a few articles to guide a new user through the confusion of installation and use. In this article, we’ll cover the basics of…

h2csmuggler: HTTP Request over HTTP/2 Cleartext (h2c)

Security researchers have found a vulnerability in insecure edge-server configurations, which allows them to bypass proxy rules and access controls. The bypass has been tested on: HAproxy Traefik Nginx How does it work? Bishopfox provided a proof-of-concept code (h2cSmuggler), and…

HTMLdate: Find publication date of any page

Find original and updated publication dates of any web page. From the command-line or within Python, all the steps needed from web page download to HTML parsing, scraping, and text analysis are included. In a nutshell, with Python: >>> from…

SocialFish: Phishing attack platform

Phishing is a form of digital scam. The word “phishing” is derived from the English word “fishing” (angling or fishing). Fraudsters mislead you with targeted fake emails. The e-mails resemble mail from well-known, and often reliable, organizations. Such as government…