Five Benefits That Will Convince You to Integrate Your Systems

6 years ago

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad…

Nuages : A Modular C2 Framework 2019

6 years ago

Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must…

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

6 years ago

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for…

Sudomy : Subdomain Enumeration Tool Created Using A Bash Script

6 years ago

Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and…

NebulousAD : Automated Credential Auditing Tool

6 years ago

NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a redact-by-group…

PHPStan – PHP Static Analysis Tool – Discover Bugs In Your Code Without Running It

6 years ago

PHPStan focuses on finding errors in your code without actually running it. It catches whole classes of bugs even before…

5 Essential Tips to Protect Your Student Data Privacy

6 years ago

The rapid advancement of technology has made it easier for students to protect their information and engage with their teachers…

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

6 years ago

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for…

4CAN : Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

6 years ago

4CAN is an open source security tool to find security vulnerabilities in modern cars. Tested on the following raspbian images…

AIL Framework : Analysis Information Leak Framework

6 years ago

AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured…