Guide to Relational Databases

4 years ago

Databases have been used by various organizations to solve business problems for a very long time. In the early days,…

CarPunk : The Car Hacking Toolkit

4 years ago

CarPunk IS VERY SIMILAR TO CANghost, ONLY THE DEFFERENCE IS, IT COMES WITH OPTIONS TO ENABLE OR DISABLE INTERFACE AND…

BurpCrypto : A Collection Of Burpsuite Encryption Plug-Ins, Support AES/RSA/DES/ExecJs(execute JS Encryption Code In Burpsuite)

4 years ago

Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Build $ mvn package Usage…

efiXplorer : IDA Plugin For UEFI Firmware Analysis And Reverse Engineering Automation

4 years ago

efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products: everytime we focus on last…

Bopscrk : Tool To Generate Smart And Powerful Wordlists

4 years ago

bopscrk (Before Outset PaSsword CRacKing) is a tool to generate smart and powerful wordlists for targeted attacks. Targeted-attack wordlist creator: introduce personal info related…

AutomatedLab : A Provisioning Solution And Framework That Lets You Deploy Complex Labs On HyperV And Azure With Simple PowerShell Scripts

4 years ago

AutomatedLab (AL) enables you to setup test and lab environments on Hyper-v or Azure with multiple products or just a…

JSPanda : Client-Side Prototype Pollution Vulnerability Scanner

4 years ago

JSpanda is client-side prototype pollution vulnerability scanner. It has two key features, scanning vulnerability the supplied URLs and analyzing the…

Databases Worldwide are Full of Security Holes

4 years ago

Data security is a big deal. Lapses in data security aren’t just a minor mistake; they can violate regulatory compliance…

LeakDB : Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search

4 years ago

LeakDB is a tool set designed to allow organizations to build and deploy their own internal plaintext "Have I Been Pwned"-like service.…

Kekeo : A Little Toolbox To Play With Microsoft Kerberos In C

4 years ago

Kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun) ASN.1 library In kekeo, I…