Protected By Tyrant Softwares
Home
Tools
Help
Scripts
User
Cybersecurity Threats and Methods & Online Privacy and Anonymity
(Any topics that are greyed out are coming soon)
Information Gathering
Doxxing
IP Pulling
Meta Data
Digital Footprint
Steganography
OSINT (Open Source Intelligence)
Reconnaissance
Social Media Scraping
WHOIS Lookup
DNS Enumeration
Shodan Search
Google Dorking
Facial Recognition Exploitation
Geolocation Tracking
Malware & Exploits
Remote Access Tools
Spyware
Ransomware
Trojans
Worms
Rootkits
Backdoors
Zero-Day Exploits
Malware
Adware
Rogue Security Software
Cryptojacking
Fileless Malware
Polymorphic Malware
Exploit Kits
Logic Bombs
Bootkits
Macro Malware
Browser Hijackers
Network Attacks
DDoS Attack
MitM Attack
DNS Spoofing
Session Hijacking
Botnets
SQL Injection
Cross-Site Scripting
Buffer Overflow
Privilege Escalation
ARP Spoofing
Packet Sniffing
Wireless Attacks
Deauthentication Attack
Evil Twin Attack
VLAN Hopping
NTP Amplification
SNMP Exploitation
Port Scanning
DNS Cache Poisoning
Social Engineering
Phishing
Swatting
Toxxing
Toxxing (discord)
Man-in-the-Browser
Pretexting
Baiting
Tailgating
Quid Pro Quo
Vishing
Smishing
Deepfake Social Engineering
Impersonation Attacks
Watering Hole Attacks
Shoulder Surfing
Anonymity & Privacy
TOR (The Onion Router)
VPNs
Proxies
Dark Web
I2P (Invisible Internet Project)
Freenet
Whonix
Tails OS
Advanced Threats
Advanced Persistent Threats
AI Bypass
Brute Force Attack
Sandbox Evasion
Fileless Attacks
Supply Chain Attacks
Watering Hole Attacks
Island Hopping
Living Off the Land
Ransomware-as-a-Service
Double Extortion
AI-Powered Phishing
Adversarial Machine Learning
Quantum Cryptography Exploits
Exploitation Techniques
Exploit Development
Shellcode Injection
Return-Oriented Programming
Heap Spraying
Format String Exploits
Race Conditions
Deserialization Attacks
Integer Overflow
Use-After-Free
Null Pointer Dereference
Side-Channel Attacks
Heap Overflow
Time-Based Attacks
Padding Oracle Attacks
Miscellaneous
Cryptography
Honeypots
Digital Forensics
Reverse Engineering
Penetration Testing
Bug Bounty Programs
Lock Picking
RFID Cloning
Bad USB Attacks
USB Drop Attacks