Terminal GPT (tgpt) – Your Direct CLI Gateway To ChatGPT 3.5

2 days ago

Terminal GPT (tgpt) offers a seamless way to bring the power of ChatGPT 3.5 directly to your command line. This…

garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language Model Security

5 days ago

garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination,…

Vermilion : Mastering Linux Post-Exploitation For Red Team Success

5 days ago

Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration of sensitive information from Linux…

AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration

5 days ago

ADCFFS is a PowerShell script that can be used to exploit the AD CS container misconfiguration allowing privilege escalation and…

Usage Of Tartufo – A Comprehensive Guide To Securing Your Git Repositories

5 days ago

Tartufo will, by default, scan the entire history of a git repository for any text which looks like a secret,…

Loco : A Rails-Inspired Framework For Rust Developers

6 days ago

Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at home. If you only know…

Monolith : The Ultimate Tool For Storing Entire Web Pages As Single HTML Files

6 days ago

A data hoarder’s dream come true: bundle any web page into a single HTML file. You can finally replace that…

Mountpoint For Amazon S3 : Enhancing File System Integration For Effective Storage Management

6 days ago

Mountpoint for Amazon S3 is a simple, high-throughput file client for mounting an Amazon S3 bucket as a local file…

LitterBox : The Ultimate Sandbox Environment For Malware Testing And Red Team Operations

1 week ago

Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox environment designed specifically for malware…

RWX_MEMORY_HUNT_AND_INJECTION_DV : Exploiting OneDrive.exe To Inject Shellcode Without New RWX Allocations

1 week ago

Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. This technique…