PowerShell Red Team : Collection Of PowerShell Functions

5 years ago

Collection of PowerShell functions a Red Teamer may use to collect data from a machine or gain access to a…

APICheck : The DevSecOps Toolset For REST APIs

5 years ago

APICheck is a complete toolset designed and created for testing REST APIs. Why APICheck? APICheck focuses not only in the…

Nethive Project : Restructured & Collaborated SIEM & CVSS Infrastructure

5 years ago

The Nethive Project provides a Security Information and Event Management (SIEM) insfrastructure empowered by CVSS automatic measurements. Features Machine Learning…

Widevine L3 Decryptor : A Chrome Extension That Demonstrates Bypassing Widevine L3 DRM

5 years ago

Widevine is a Google-owned DRM system that's in use by many popular streaming services (Netflix, Spotify, etc.) to prevent media…

Scrying : A Tool For Collecting RDP, Web & VNC Screenshots All In One Place

5 years ago

Scrying is a new tool for collecting RDP, web and VNC screenshots all in one place. This tool is still…

What Should Be Included in Your Independent Contractor Agreement?

5 years ago

In any business partnership, contracts are a must, but they are especially essential for independent contractors to:  Legally Protect Develop rights…

American Bobtail Cat Breed Guide – Characteristics, Health and Care

5 years ago

What can we say about this breed of cat but that the most obvious characteristic that can easily identify him…

Awesome Android Security

5 years ago

A curated list of Android Security materials and resources For Pentesters and Bug Hunters. Blog AAPG - Android application penetration…

JWT-Hack : Hack the JWT(JSON Web Token)

5 years ago

JWT-Hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and…

ISH : Linux Shell For iOS

5 years ago

ISH is a project to get a Linux shell running on iOS, using usermode x86 emulation and syscall translation. For…