Certipy : Python Implementation For Active Directory Certificate Abuse

4 years ago

Certipy is a Python tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). Based on the…

Tor-Rootkit : A Python 3 Standalone Windows 10 / Linux Rootkit Using Tor

4 years ago

Tor-Rootkit is a Python 3 standalone Windows 10 / Linux Rootkit. The networking communication get's established over the tor network.…

PyRDP : RDP Monster-In-The-Middle (Mitm) And Library For Python With The Ability To Watch Connections Live Or After The Fact

4 years ago

PyRDP is a Python Remote Desktop Protocol (RDP) Monster-in-the-Middle (MITM) tool and library. It features a few tools: RDP Monster-in-the-MiddleLogs…

Androidqf : (Android Quick Forensics) Helps Quickly Gathering Forensic Evidence From Android Devices, In Order To Identify Potential Traces Of Compromise

4 years ago

Androidqf (Android Quick Forensics) is a portable tool to simplify the acquisition of relevant forensic data from Android devices. It…

If You Need Academic Help, Here’s Where You Can Get It

4 years ago

I cannot believe I'm in year 3 what I'm don't qualify this time next year anyway. This is something for…

How to Protect Small and Medium-Sized Businesses From Cyberattacks

4 years ago

Many small and medium-sized business owners mistakenly believe that their businesses will not fall victim to cyberattacks due to low…

LDAPmonitor : Monitor Creation, Deletion And Changes To LDAP Objects Live During Your Pentest Or System Administration!

4 years ago

LDAPmonitor is a Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this…

TIWAP : Totally Insecure Web Application Project

4 years ago

TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities.…

Cybersecurity Tips For Startups

4 years ago

Large Corporations, well-established government agencies, and non-governmental agencies have invested in cybersecurity to build more threat-resilient networks and systems. The…

HandleKatz : PIC Lsass Dumper Using Cloned Handles

4 years ago

HandleKatz tool was implemented as part of our Brucon2021 conference talk and demonstrates the usage of cloned handles to Lsass in order…