jwt_tool : Unlocking JWT Security With The JSON Web Token Toolkit

3 months ago

Discover the power of jwt_tool, a comprehensive toolkit designed for the robust testing of JSON Web Tokens (JWTs). Perfect for…

Certiception – Reinventing Network Security With Deceptive Active Directory Certificate Services

3 months ago

Certiception is a honeypot for Active Directory Certificate Services (ADCS), designed to trap attackers with a realistic and attractive bait…

Lemma – Harnessing AWS Lambda For Scalable Command-Line Tool Execution

3 months ago

The author of this project is not responsible for any damage or data loss incurred as a result of using…

AMSI Bypass via VEH – Technique Using Vectored Exception Handling

3 months ago

A PowerShell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, function hooking…

RedELK – Essential Naming Requirements For Deployment

3 months ago

In the complex landscape of RedELK deployment, adhering to precise naming requirements is crucial for operational success. This article delves…

Kdrill – Unveiling Rootkit Intrusions In Windows 64-Bit Systems

3 months ago

Kdrill is a tool to analyze the kernel land of Windows 64b systems (tested from Windows 7 to Windows 11).…

LogHunter – A Revolutionary Tool For Session Detection via Event Logs

3 months ago

Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN). I was once doing a very…

APKscan – Mastering Android Security Analysis

3 months ago

APKs (Android Package Kits) often leak secrets due to over-reliance on security through obscurity. Developers sometimes leave sensitive information such as API keys, tokens, and credentials hidden…

Akto.io – Comprehensive Security Testing And Inventory Management

3 months ago

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

CCC : Cyberspace Under Siege – Understanding Crime, Espionage, And Conflict

3 months ago

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The…