CVE Collector – A Python Tool For Managing CVE Data

2 years ago

Discover how to create a powerful CVE Collector using Python. This article provides guidance on collecting, managing, and staying updated…

Qu1ckdr0p2 – A Powerful Tool For Rapidly Hosting Payloads And Post-Exploitation Bins

2 years ago

In the world of cybersecurity and penetration testing, speed and efficiency can make all the difference. Enter Qu1ckdr0p2, a versatile…

TrafficWatch – A Comprehensive Guide To Network Traffic Analysis With Packet Sniffing

2 years ago

TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files. It provides insights into…

USB flows In The Great River – IDA FLIRT Signature And IOC

2 years ago

IDA Pro FLIRT signature for FlowCloud RAT component, "fcClientDll and Indicators mentioned in my presentation "USB flows in the Great…

Social-Media-OSINT-Tools-Collection – A Powerful Toolkit

2 years ago

A collection of most useful tools for social media osint. Unlock the potential of Open-Source Intelligence (OSINT) with our curated…

EMBA v1.3.1 : Diff It – Unveiling The Firmware Diffing Mode And Latest Updates

2 years ago

What Happened Since The Last EMBA Release? There was the absolute great #Hackersummercamp with our talks at BSidesLV, ICS Village (DEF CON)…

Furl – Wayback Machine URL Mining For Bug Hunting

2 years ago

Furl is a tool for mining URLs from Wayback Machine for bug hunting/fuzzing/further probing. Furl is a powerful tool designed…

C2 Tracker – Tracking C2, Malware, and Botnets

2 years ago

Free to use IOC feed for various tools/malware. It started out for just C2 tools but has morphed into tracking…

CryptoTester – Cryptography Utility For Ransomware Analysis

2 years ago

A utility for playing with cryptography, geared towards ransomware analysis. CryptoTester is a powerful utility designed for in-depth cryptographic analysis,…

PatchaPalooza – Your Offline Resource For Microsoft Security Update Analysis

2 years ago

A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates. In the ever-evolving landscape of cybersecurity, staying…