PwnedPasswordsDownloader – Efficient Downloading Of HIBP Password Hashes Using Curl Parallelism

1 month ago

Thanks for HIBP and this downloader. At first I was considering using it, but the API of HIBP passwords is…

Cybersecurity Conferences – A Comprehensive Slide Collection

1 month ago

Comprehensive repository for presentation slides from major cybersecurity conferences held in 2023 and 2024. It provides quick access to the…

DLL Proxy Generator – Harnessing Advanced Proxy Capabilities

1 month ago

Generate a proxy dll for arbitrary dll, while also loading a user-defined secondary dll. In the evolving landscape of software…

DLL Universal Patcher – A Comprehensive Guide To Advanced Binary Patching

1 month ago

DLL Universal Patcher is a flexible and convenient code patcher that doesn't touch the files on disk. It can be…

RustiveDump : A Rust-Based Tool For Efficient Memory Dumping Of lsass.exe

1 month ago

RustiveDump is a Rust-based tool designed to dump the memory of the lsass.exe process using only NT system calls. It…

SharpExclusionFinder – Streamlining Windows Defender Exclusion Checks With Advanced Scanning Capabilities

2 months ago

This C# program finds Windows Defender folder exclusions using Windows Defender through its command-line tool (MpCmdRun.exe). The program processes directories…

Argus – The Ultimate Python Toolkit For Advanced Network Reconnaissance

2 months ago

Argus is an all-in-one, Python-powered toolkit designed to streamline the process of information gathering and reconnaissance. With a user-friendly interface…

SlackEnum – Mastering User Enumeration On Slack

2 months ago

A specialized tool designed for user enumeration on the Slack platform. This powerful utility aids in identifying active users within…

Operation Archive – Documenting The Dark Web’s Takedown

2 months ago

This repository will be used to add documents, pictures, etc on LEA efforts; Indictments, Seizure Warrants, Raids with photos/video, Online…

Java Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities

2 months ago

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use #javadeser hash…