Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)

4 years ago

Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the Doyensec…

Cyberstalkers: How to Protect Yourself

4 years ago

Modern-day communication technology is one of the most advanced and influential inventionsto affect humanity. However, it does have a dark…

Data Breaches Aren’t Going Away: Everything You Need to Know to Protect Your Business

4 years ago

Despite major cyber-attacks making headlines every month or so, several businesses are far behind the curve when it comes to…

Orbitaldump : A Simple Multi-Threaded Distributed SSH Brute-Forcing Tool Written In Python

4 years ago

Orbitaldump is a simple multi-threaded distributed SSH brute-forcing tool written in Python. When the script is executed without the --proxies switch, it…

ARTIF : An Advanced Real Time Threat Intelligence Framework To Identify Threats And Malicious Web Traffic On The Basis Of IP Reputation And Historical Data.

4 years ago

ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of…

JWTweak : Detects The Algorithm Of Input JWT Token And Provide Options To Generate The New JWT Token Based On The User Selected Algorithm

4 years ago

JWTweak is a tool to detects The Algorithm Of Input JWT Token And Provide Options To Generate The New JWT…

DNSrr : A Tool Written In Bash, Used To Enumerate All The Juicy Stuff From DNS

4 years ago

DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS records, it uses different…

Whisker : A C# Tool For Taking Over Active Directory User And Computer Accounts By Manipulating Their msDS-KeyCredentialLink Attribute

4 years ago

Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding "Shadow…

The-Bastion : Authentication, Authorization, Traceability And Auditability For SSH Accesses

4 years ago

Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins, developers, database…

DNSStager : Hide Your Payload In DNS

4 years ago

DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create…