DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results

2 years ago

Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.…

All-in-One Bug Hunting Setup: The Ultimate Debian Linux Script for Cybersecurity Enthusiasts

2 years ago

In the always-changing world of cybersecurity, it's important to be quick and careful. For Debian Linux users who are really…

Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation

2 years ago

Amnesiac is a post-exploitation framework designed to assist with lateral movement within active directory environments. Amnesiac is being developed to bridge…

Mantis: The Comprehensive Command-Line Framework for Asset Discovery and Security Scanning

2 years ago

Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level…

llamafile: Streamlining Access to Large Language Models with Single-File Executables for Local Deployment

2 years ago

llamafile lets you distribute and run LLMs with a single file. (announcement blog post) Our goal is to make open…

Free Threat Intel/IOC Feeds: Maximizing Cybersecurity Efficacy with Open-Source Intelligence Integration

2 years ago

This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. The CSV ThreatIntelFeeds is stored…

Hayabusa: Revolutionizing Windows Event Log Analysis with Rapid Forensics and Advanced Threat Hunting Capabilities

2 years ago

Hayabusa is a Windows event log fast forensics timeline generator and threat hunting tool created by the Yamato Security group in Japan. Hayabusa means "peregrine falcon" in Japanese…

EvilSlackbot: A Cutting-Edge Tool for Enhancing Slack Workspace Security through Red Team and Phishing Simulations

2 years ago

It's impossible to say enough about how important cybersecurity is in this digital age, where teamwork tools like Slack are…

IMDSPOOF: Enhancing Cloud Security with Deceptive AWS IMDS Endpoint Spoofing

2 years ago

IMDSPOOF is a cyber deception tool that spoofs an AWS IMDS service. One way that attackers are able to escalate…

Telerecon: The OSINT Framework for Deep Telegram Analysis

2 years ago

Telerecon is a comprehensive OSINT reconnaissance framework for researching, investigating, and scraping Telegram. For example: Input a target username, and…