You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser,…
EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.…
Nginx Log Check is a nothing but a Nginx Log Security Analysis Script. Following are some of the feature for…
Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and…
This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for…
Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and…
Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the msfrpc…
The Internet is no longer a luxury. It is a part of our daily lives and imagining life without it…
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of…
HashCobra is a tool uses a new method to crack hashes. With the help of rainbow tables concept this tool…