Hayabusa: Revolutionizing Windows Event Log Analysis with Rapid Forensics and Advanced Threat Hunting Capabilities

2 years ago

Hayabusa is a Windows event log fast forensics timeline generator and threat hunting tool created by the Yamato Security group in Japan. Hayabusa means "peregrine falcon" in Japanese…

EvilSlackbot: A Cutting-Edge Tool for Enhancing Slack Workspace Security through Red Team and Phishing Simulations

2 years ago

It's impossible to say enough about how important cybersecurity is in this digital age, where teamwork tools like Slack are…

IMDSPOOF: Enhancing Cloud Security with Deceptive AWS IMDS Endpoint Spoofing

2 years ago

IMDSPOOF is a cyber deception tool that spoofs an AWS IMDS service. One way that attackers are able to escalate…

Telerecon: The OSINT Framework for Deep Telegram Analysis

2 years ago

Telerecon is a comprehensive OSINT reconnaissance framework for researching, investigating, and scraping Telegram. For example: Input a target username, and…

Commix: The Command Injection Exploiter for Penetration Testing

2 years ago

It stands for "comm and injection exploiter." Commix is a state-of-the-art open-source tool made for penetration testers and other cybersecurity…

Instagram Location Search: Navigating and Scraping Proximal Points with Ease

2 years ago

Find out how powerful Instagram Location Search is. It's a flexible Python tool that makes it easier to find and…

Active Directory Canaries: Advanced Detection and Prevention of AD Enumeration

2 years ago

Active Directory Canaries is a detection primitive for Active Directory enumeration (or recon) techniques. It abuses the concept of DACL…

FACTION PenTesting Report Generation and Collaboration Engine

2 years ago

In the world of cybersecurity, where things change quickly, it's important to do thorough and fast penetration testing. Here comes…

XnLinkFinder v4.1 – A Comprehensive Guide To Discovering Endpoints And Parameters

2 years ago

This is a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:…

Osquery-Defense-Kit : Enhancing Cybersecurity

2 years ago

Osquery queries for Detection & Incident Response, containing 250+ production-ready queries. ODK (osquery-defense-kit) is unique in that the queries are…