WELA (Windows Event Log Analyzer)

1 year ago

Windows Event Log Analyzer wants to be the Swiss Army knife of Windows event logs. At the moment, WELA's best…

PersistenceSniper – A PowerShell Tool For Blue Teams, Incident Responders & System Admin

1 year ago

PersistenceSniper is a Powershell tool that Blue Teams, Incident Responders, and System Administrators can use to find persistent threats on…

Domain-Protect : OWASP Domain Protect

1 year ago

Domain-Protect is an OWASP Domain Protect - prevent subdomain takeover. Prevent subdomain takeover ... ... with serverless cloud infrastructure OWASP…

Metlo : An Open-Source API Security Platform

1 year ago

Metlo is an open-source API security platform. Metlo is an open source API security tool you can setup in <…

Hackingtool – All in One Hacking tool For Hacker

1 year ago

A hacking tool is a piece of software that can be used for different things in cybersecurity and vulnerability testing.…

Bryobio – NETWORK Pcap File Analysis For SOC Analysts

1 year ago

When you look at a network PCAP (Packet Capture) file, you look at the network traffic data that was recorded…

Nimbo-C2 : Lightweight C2 Framework

1 year ago

Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim,…

Why IT Consultancy is the Cornerstone of Digital Transformation

1 year ago

In the ever-evolving landscape of technology, businesses are continually striving to remain competitive and relevant. In this pursuit, the role…

BITB – Browser Templates For The Browser In The Browser Attack

1 year ago

The idea of a BITB (Browser Templates For The Browser In The Browser) attack came about because of new computer…

Integrating Construction Contract Management Software: Key Features to Consider

2 years ago

Contract management software has become an essential tool for the construction industry, streamlining processes and improving efficiency in project management.…