Windows Event Log Analyzer wants to be the Swiss Army knife of Windows event logs. At the moment, WELA's best…
PersistenceSniper is a Powershell tool that Blue Teams, Incident Responders, and System Administrators can use to find persistent threats on…
Domain-Protect is an OWASP Domain Protect - prevent subdomain takeover. Prevent subdomain takeover ... ... with serverless cloud infrastructure OWASP…
Metlo is an open-source API security platform. Metlo is an open source API security tool you can setup in <…
A hacking tool is a piece of software that can be used for different things in cybersecurity and vulnerability testing.…
When you look at a network PCAP (Packet Capture) file, you look at the network traffic data that was recorded…
Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim,…
In the ever-evolving landscape of technology, businesses are continually striving to remain competitive and relevant. In this pursuit, the role…
The idea of a BITB (Browser Templates For The Browser In The Browser) attack came about because of new computer…
Contract management software has become an essential tool for the construction industry, streamlining processes and improving efficiency in project management.…