OverRide : Binary Exploitation And Reverse-Engineering

5 years ago

OverRide is a explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you…

SlackPirate : Slack Enumeration & Extraction Tool

5 years ago

SlackPirate is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack…

Simple Business Plan for Internet Café

5 years ago

A cyber cafe or internet cafe has been a favorite destination for millions of people for over 30 years. The…

IPCDump : Tool For Tracing Interprocess Communication (IPC) On Linux

5 years ago

IPCDump is a tool for tracing inter-process communication (IPC) on Linux. It covers most of the common IPC mechanisms --…

Reasons to Rebrand Your Business

5 years ago

Rebranding your business could be the best or the worst decision a company could make. There have been instances where…

CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names

5 years ago

CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization.…

Vulnerablecode : A Free And Open Vulnerabilities Database

5 years ago

VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the…

Kubesploit : A Cross-Platform Post-Exploitation HTTP/2 Command

5 years ago

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and…

DNSPeep : Spy On The DNS Queries Your Computer Is Making

5 years ago

DNSPeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name…

Overlord : Red Teaming Infrastructure Automation

5 years ago

Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user…