Caro Kann – Evading Kernel Scans with Encrypted Shellcode

2 years ago

In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils…

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

2 years ago

Secure Shell Bruteforcer - A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are…

Furlzz – Advanced iOS URL Scheme Fuzzing Made Easy

2 years ago

Furlzz is a small fuzzer written to test out iOS URL schemes. It does so by attaching to the application…

ReconAIzer – Enhancing Burp Suite With OpenAI

2 years ago

ReconAIzer is a powerful Jython extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon…

ACLToolkit – The Ultimate ACL Abuse Toolkit Guide

2 years ago

In the intricate world of cyber security, managing and understanding access control lists (ACLs) becomes paramount. 'acltoolkit' emerges as a…

CakeFuzzer – Vulnerability Detection for CakePHP

2 years ago

Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based…

ZeusCloud: The Next-Gen Open Source Cloud Security Solution

2 years ago

The field of cloud computing is growing quickly, and security threats and problems have grown at the same rate. ZeusCloud…

SysReptor: Cloud & Self-hosted Security Reporting

2 years ago

SysReptor is a fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. User…

Wallet Transaction Monitor: Real-time Bitcoin Updates & Alerts

2 years ago

This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new…

Bashfuscator – The Art of Concealing Bash Scripts

2 years ago

Documentation What Is Bashfuscator? Bashfuscator is a modular and extendable Bash obfuscation framework written in Python 3. It provides numerous…