Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview…
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It…
The most popular penetration testing distro Kali linux announced a new version that included extended support for OpenSSL, new Tools,…
Pantagrule is a series of rules for the hashcat password cracker generated from large amounts of real-world password compromise data. While Pantagrule…
Ctf-Screenshotter is a CTF web challenge about making screenshots. It is inspired by a bug found in real life. The…
BeaconEye scans running processes for active Cobalt Strike beacons. When processes are found to be running beacon, BeaconEye will monitor…
Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in…
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing levels…
Much of an Ethical Hacker’s skills are put into testing security controls and perimeter penetration vulnerabilities in devices. They also…
Are you a database admin looking for ways to make your life easier? There are plenty of effective strategies to…