Nuclei-Burp-Plugin : Nuclei Plugin For BurpSuite

3 years ago

Nuclei-Burp-Plugin is a BurpSuite plugin intended to help with nuclei template generation. Features Template matcher generation Word and Binary matcher creation using selected response snippets from Proxy history or Repeater contextsMulti-line…

Ghostbuster : Eliminate Dangling Elastic IPs By Performing Analysis On Your Resources

3 years ago

Ghostbuster obtains all the DNS records present in all of your AWS accounts (Route53), and can optionally take in records…

Kali Linux – The Best Tool For Penetration Testing?

3 years ago

The penetration tool known as Kali Linux is a Debian-based Linux distribution that was created with security testing and auditing…

Epagneul : Graph Visualization For Windows Event Logs

3 years ago

Epagneul is a tool to visualize and investigate windows event logs. Deployment Requires docker and docker-compose to be installed. Installing…

S1EM : This Project Is A SIEM With SIRP And Threat Intel, All In One

3 years ago

S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and…

How To Improve The Cyber Security Of A Law Firm

3 years ago

It is not surprising to see that cyber criminals often attack law firms. This is due to the client information…

Dangers of an Electric Scooter Hack

3 years ago

When it comes to hacking it is very much open field in terms of devices which depend on electronic connectivity.…

Mip22 : An Advanced Phishing Tool

3 years ago

Mip22 program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of…

PurplePanda : Identify Privilege Escalation Paths Within And Across Different Clouds

3 years ago

PurplePanda is a tool that fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths…

RefleXXion : A Utility Designed To Aid In Bypassing User-Mode Hooks Utilised By AV/EPP/EDR Etc

3 years ago

RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the…