Okta Terrify – Exposing Vulnerabilities In Passwordless Authentication

5 months ago

This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The…

Cyber Detective’s OSINT Tools Collection

5 months ago

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…

SocialPath – A Comprehensive Tool For Social Media Analysis And Darknet User Tracking

5 months ago

SocialPath emerges as a cutting-edge tool designed for security researchers and digital forensics experts. It enables the tracking and analysis…

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

5 months ago

Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…

Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

5 months ago

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

5 months ago

Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…

Pacu – A Comprehensive Guide To The AWS Exploitation Framework

5 months ago

Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…

Voidgate – Advanced Technique To Bypass AV/EDR Memory Scanners

5 months ago

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…

sttr – A Command Line Tool For String Transformations

5 months ago

sttr is command line software that allows you to quickly run various transformation operations on the string. // With input prompt…

CyberChef – The Ultimate Cyber Swiss Army Knife

5 months ago

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These…