The increased use of technological devices has increased cybersecurity threats. Technology is constantly advancing, and the use of the internet…
Games like Fortnite or League of Legends don't become a huge sensation for no reason they usually share a set…
Many developers and programmers use Linux as their operating system of choice. Most professional developers choose to utilize it for…
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user passwords, Resolve-DnsName for DNS…
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works…
Dorothy is a tool to help security teams test their monitoring and detection capabilities for their Okta environment. Dorothy has…
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security…
TokenTactics is a Azure JSON Web Token ("JWT") Manipulation Toolset. Azure access tokens allow you to authenticate to certain endpoints…
Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Installing /…
Rconn (r[everse] conn[ection]) is a multiplatform program for creating reverse connections. It lets you consume services that are behind NAT…