Epagneul : Graph Visualization For Windows Event Logs

3 years ago

Epagneul is a tool to visualize and investigate windows event logs. Deployment Requires docker and docker-compose to be installed. Installing…

S1EM : This Project Is A SIEM With SIRP And Threat Intel, All In One

3 years ago

S1EM solution is based on the principle of bringing together the best products in their field, free of charge, and…

How To Improve The Cyber Security Of A Law Firm

3 years ago

It is not surprising to see that cyber criminals often attack law firms. This is due to the client information…

Dangers of an Electric Scooter Hack

3 years ago

When it comes to hacking it is very much open field in terms of devices which depend on electronic connectivity.…

Mip22 : An Advanced Phishing Tool

3 years ago

Mip22 program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of…

PurplePanda : Identify Privilege Escalation Paths Within And Across Different Clouds

3 years ago

PurplePanda is a tool that fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths…

RefleXXion : A Utility Designed To Aid In Bypassing User-Mode Hooks Utilised By AV/EPP/EDR Etc

3 years ago

RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the…

WMEye : A Post Exploitation Tool That Uses WMI Event Filter And MSBuild Execution For Lateral Movement

3 years ago

WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral…

Lnkbomb : Malicious Shortcut Generator For Collecting NTLM Hashes From Insecure File Shares

3 years ago

Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for…

Patching : An Interactive Binary Patching Plugin For IDA Pro

3 years ago

Patching assembly code to change the behavior of an existing program is not uncommon in malware analysis, software reverse engineering,…