FastFinder : Incident Response – Fast Suspicious File Finder

3 years ago

FastFinder is a lightweight tool made for threat hunting, live forensics and triage on both Windows and Linux Platforms. It is…

Oh365UserFinder : Python3 O365 User Enumeration Tool

3 years ago

Oh365UserFinder is used for identifying valid o365 accounts and domains without the risk of account lockouts. The tool parses responses…

PSRansom : PowerShell Ransomware Simulator With C2 Server

3 years ago

PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic ransomware…

S3Sec : Check AWS S3 Instances For Read/Write/Delete Access

3 years ago

S3Sec tool was developed to quickly test a list of s3 buckets for public read, write and delete access for…

Nuclei-Burp-Plugin : Nuclei Plugin For BurpSuite

3 years ago

Nuclei-Burp-Plugin is a BurpSuite plugin intended to help with nuclei template generation. Features Template matcher generation Word and Binary matcher creation using selected response snippets from Proxy history or Repeater contextsMulti-line…

Ghostbuster : Eliminate Dangling Elastic IPs By Performing Analysis On Your Resources

3 years ago

Ghostbuster obtains all the DNS records present in all of your AWS accounts (Route53), and can optionally take in records…

Kali Linux – The Best Tool For Penetration Testing?

3 years ago

The penetration tool known as Kali Linux is a Debian-based Linux distribution that was created with security testing and auditing…

Epagneul : Graph Visualization For Windows Event Logs

3 years ago

Epagneul is a tool to visualize and investigate windows event logs. Deployment Requires docker and docker-compose to be installed. Installing…

S1EM : This Project Is A SIEM With SIRP And Threat Intel, All In One

3 years ago

S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and…

How To Improve The Cyber Security Of A Law Firm

3 years ago

It is not surprising to see that cyber criminals often attack law firms. This is due to the client information…