5 Types of Cyber Security Threats

4 years ago

A cyber-attack can cause devastating effects on a business. Not only can it shut down your operations, but your reputation…

DetectionLabELK : A Fork From DetectionLab With ELK Stack Instead Of Splunk

4 years ago

DetectionLabELK is the perfect lab to use if you would like to build effective detection capabilities. It has been designed…

Cracken : A Fast Password Wordlist Generator, Smartlist Creation And Password Hybrid-Mask Analysis Tool

4 years ago

Cracken is a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust (more…

FakeDataGen : Full Valid Fake Data Generator

4 years ago

FakeDataGen is a Full Valid Fake Data Generator. This tool helps you to create fake accounts (in Spanish format) with fully…

ELFXtract : An Automated Analysis Tool Used For Enumerating ELF Binaries

4 years ago

ELFXtract is an automated analysis tool used for enumerating ELF binaries Powered by Radare2 and r2ghidra This is specially developed for PWN challenges and…

LOLBins : PyQT5 App For LOLBAS And GTFOBins

4 years ago

LOLBins is a PyQT app to list all Living Off The Land Binaries and Scripts for Windows from LOLBAS and Unix binaries…

Redherd Framework : A Collaborative And Serverless Framework For Orchestrating A Geographically Distributed Group Of Assets

4 years ago

Redherd Framework is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of conducting simulating complex offensive…

Whoc : A Container Image That Extracts The Underlying Container Runtime

4 years ago

Whoc is a container image that extracts the underlying container runtime and sends it to a remote server. Poke at…

Whispers : Identify Hardcoded Secrets In Static Structured Text

4 years ago

Whispers is a static code analysis tool designed for parsing various common data formats in search of hardcoded credentials and…

UDP-Hunter : Network Assessment Tool For Various UDP Services Covering Both IPv4 And IPv6 Protocols

4 years ago

UDP-Hunter is a UDP Scanning has always been a slow and painful exercise, and if you add IPv6 on top…