Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is…
Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…
Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…
Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…
Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…
This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…
In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and…
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…
Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum,…
Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run,…