Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

6 years ago

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of…

Scallion : GPU-Based Onion Hash Generator

6 years ago

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono…

AntiCheat : Framework To Test Any Anti-Cheat

6 years ago

AntiCheat is a framework to test any Anti-Cheat on the market. This can be used as Template or Code Base…

Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

6 years ago

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup…

Gowitness : A Golang Web Screenshot Utility Using Chrome Headless

6 years ago

Gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using…

Lsassy : Extract Credentials From Lsass Remotel

6 years ago

Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary…

5 Tips to Protect Yourself from Cyberattacks at The University

6 years ago

Students often don’t see the importance of securing themselves in the cyber world because they do not perceive themselves as…

Top 3 Best Ways to Track Someone by Cell Phone Number

6 years ago

There are many people who know quite well how to track someone by cell phone number, but there are some…

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

6 years ago

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and…

Shell Backdoor List : PHP / ASP Shell Backdoor List

6 years ago

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to…