Azure AD Attack & Defense Playbook

2 years ago

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated…

TinyCheck – Spotting Malicious Networks With Ease

2 years ago

Description TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to…

ProtoBurp++: Elevating Protobuf Security Research

2 years ago

A game-changer in cybersecurity tooling, designed to take Protobuf fuzzing and encoding in Burp Suite to new heights. Dive in…

Donut-Decryptor : Unmasking Binary Secrets

2 years ago

Navigating the maze of binary obfuscation? Meet the "Donut-Decryptor", a tool tailored to decode the elusive Donut obfuscation. Dive in…

BucketLoot – An Automated S3 Bucket Inspector

2 years ago

Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who…

Kubetools – A Curated List of Kubernetes Tools

2 years ago

There are more than 450+ Kubernetes Certified Service Providers and tons of Kubernetes Certified distributions. Choosing a right distribution can be a daunting…

Caro Kann – Evading Kernel Scans with Encrypted Shellcode

2 years ago

In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils…

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

2 years ago

Secure Shell Bruteforcer - A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are…

Furlzz – Advanced iOS URL Scheme Fuzzing Made Easy

2 years ago

Furlzz is a small fuzzer written to test out iOS URL schemes. It does so by attaching to the application…

ReconAIzer – Enhancing Burp Suite With OpenAI

2 years ago

ReconAIzer is a powerful Jython extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon…