tsharkVM, this project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual…
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware…
It doesn’t matter what industry you’re in, it’s important to ensure compliance. You need to adhere to local and national…
adalanche is a Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way…
JWTXploiter is a tool to test security of JSON Web Tokens. Test a JWT against all known CVEs; Tamper with…
Front-end development is a mix of development, technology, trends, design, graphic, usability, and creativity that is responsible for everything, what’s…
Raiders is a framework designed to test authentication for web applications. While web proxies like ZAProxy and Burpsuite allow authenticated tests, they don't provide…
Cerbrutus is a Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in…
jsleak is a tool to identify sensitive data in JS files through regex patterns. Although it's built for this, you…
CSIRT-Collect is a PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a…