NodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you…
PBTK is a tool that can be used for reverse engineering and fuzzing protobuf based application. Protobuf is a serialization…
You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser,…
EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.…
Nginx Log Check is a nothing but a Nginx Log Security Analysis Script. Following are some of the feature for…
Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and…
This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for…
Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and…
Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the msfrpc…
The Internet is no longer a luxury. It is a part of our daily lives and imagining life without it…