O365-Doppelganger is NOT a replacement for hardcore phishing activities. There are several other tools which perform OAuth and OTA capture…
Depending on who you ask, cryptocurrency is either a fantastic new era of financial regulation or a confusing mess of…
VulFi (Vulnerability Finder) tool is a plugin to IDA Pro which can be used to assist during bug hunting in…
Bore, a modern simple TCP tunnel in Rust that exposes local ports to a remote server, bypassing standard NAT connection…
DDexec is a Technique To Run Binaries Filelessly And Stealthily On Linux Using Dd To Replace The Shell With Another…
Wpgarlic is a proof-of-concept WordPress plugin fuzzer used in the research described in https://kazet.cc/2022/02/03/fuzzing-wordpress-plugins.html that helped to discover more than 140 vulnerablities…
Git-Dumper is a tool to dump a git repository from a website. Install This can be installed easily with pip:…
Spring4Shell-Scan is a fully automated, reliable, and accurate scanner for finding Spring4Shell and Spring Cloud RCE vulnerabilities. Features Support for…
What is Cryptography? A closer look at the etymology of the word "cypher" reveals that the word originated in ancient…
Spock SLAF is a Shared Library Application Firewall "SLAF". It has the purpose to protect any service that uses the OpenSSL library. The…