Ashok – The Ultimate Reconnaissance Toolkit For Penetration Testers

5 months ago

Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is…

IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes

5 months ago

Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…

SharpGraphView – A Modular Toolkit For Advanced Azure Cloud Attacks

5 months ago

Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…

Gungnir : Monitoring Certificate Transparency In Real-Time

5 months ago

Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…

Binary Exploitation Notes – Techniques, Resources, And More

5 months ago

Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…

Awesome-Mobile-CTF : The Ultimate Guide To Mobile Capture The Flag Challenges And Resources

5 months ago

This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…

ArreStats – The Ultimate Tool For Exploring New Jersey’s Arrest Records

5 months ago

In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and…

teler : Version 3 With Enhanced Capabilities And Community-Driven Development

5 months ago

teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…

Invoke-ADEnum : Comprehensive Guide To Active Directory Enumeratio

5 months ago

Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum,…

Quick Setup Guide for Amnesiac – Running Directly From Memory

5 months ago

Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run,…