Application Inspector : A Source Code Analyzer Built For Surfacing Features Of Interest

6 years ago

Microsoft Application Inspector is a software source code analysis tool that helps identify and surface well-known features and other interesting…

PythonAESObfuscate : Obfuscates a Python Script & Accompanying Shellcode

6 years ago

PythonAESObfuscate is a tool used for Pythonic way to load shellcode. Builds an EXE for you too! Usage Place a…

Kali Linux 2020.1 Release

6 years ago

We are incredibly excited to announce the first release of 2020, Kali Linux 2020.1. It includes some exciting new updates:…

Socialscan – Check Email Address And Username Availability On Online Platforms With 100% Accuracy

6 years ago

Socialscan offers accurate and fast checks for email address and username usage on online platforms. Given an email address or username, socialscan returns whether…

CredNinja – A Multithreaded Tool Designed To Identify If Credentials Via SMB

6 years ago

CredNinja is a multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a…

Cyber Essentials Accreditation and Its Impact to Retail Stores

6 years ago

If you aren’t accredited for Cyber Essentials, then you’re missing out on A-L-O-T. If you’re new to the term, Cyber…

Mimir : Smart OSINT Collection Of Common IOC Types

6 years ago

Mimir is a smart OSINT collection of common IOC types. This application is designed to assist security analysts and researchers…

AirCrack-NG : WiFi Security Auditing Tools Suite

6 years ago

AirCrack-NG is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security:…

AgentSmith-HIDS : Open Source Host-based Intrusion Detection System

6 years ago

Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However,…

Memhunter : Live Hunting Of Code Injection Techniques

6 years ago

Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and…