LazySign – Create Fake Certs For Binaries Using Windows Binaries And The Power Of Bat Files

4 years ago

LazySign create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool…

Brutus : An Educational Exploitation Framework Shipped On A Modular And Highly Extensible Multi-Tasking And Multi-Processing Architecture

4 years ago

Brutus is an educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Introduction Looking for…

PickleC2 : A Post-Exploitation And Lateral Movements Framework

4 years ago

PickleC2 is a simple C2 framework written in python3 used to help the community in Penetration Testers in their red…

TsharkVM : Tshark + ELK Analytics Virtual Machine

4 years ago

tsharkVM, this project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual…

Process-Dump : Windows Tool For Dumping Malware PE Files From Memory Back To Disk For Analysis

4 years ago

Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware…

How to ensure compliance in the workplace

4 years ago

It doesn’t matter what industry you’re in, it’s important to ensure compliance. You need to adhere to local and national…

adalanche : Active Directory ACL Visualizer and Explorer

4 years ago

adalanche is a Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way…

JWTXploiter : A Tool To Test Security Of Json Web Token

4 years ago

JWTXploiter is a tool to test security of JSON Web Tokens. Test a JWT against all known CVEs; Tamper with…

Top 6 Front End Development Companies

4 years ago

Front-end development is a mix of development, technology, trends, design, graphic, usability, and creativity that is responsible for everything, what’s…

Raider : Web Authentication Testing Framework

4 years ago

Raiders is a framework designed to test authentication for web applications. While web proxies like ZAProxy and Burpsuite allow authenticated tests, they don't provide…