Sniffle : A Sniffer For Bluetooth 5 And 4.X LE

4 years ago

Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful…

Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset

4 years ago

Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse…

Personal Cybersecurity Tips

4 years ago

The increased use of technological devices has increased cybersecurity threats. Technology is constantly advancing, and the use of the internet…

What Makes a Great Online Game?

4 years ago

Games like Fortnite or League of Legends don't become a huge sensation for no reason they usually share a set…

Best Linux Distro For Students

4 years ago

Many developers and programmers use Linux as their operating system of choice. Most professional developers choose to utilize it for…

CredPhish : A PowerShell Script Designed To Invoke Legitimate Credential Prompts And Exfiltrate Passwords Over DNS

4 years ago

CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS…

LoGiC.NET : A More Advanced Free And Open .NET Obfuscator Using Dnlib

4 years ago

LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works…

Dorothy : Tool To Test Security Monitoring And Detection For Okta Environments

4 years ago

Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has…

Reconmap : VAPT (Vulnerability Assessment And Penetration Testing) Automation And Reporting Platform

4 years ago

Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security…

TokenTactics : Azure JWT Token Manipulation Toolset

4 years ago

TokenTactics is a Azure JSON Web Token ("JWT") Manipulation Toolset. Azure access tokens allow you to authenticate to certain endpoints…