Shwmae – Exploiting Windows Hello Security Protocols

11 months ago

Shwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing…

PentestGPT – A Comprehensive Guide To Local And Hosted Deployment

11 months ago

PentestGPT provides advanced AI and integrated tools to help security teams conduct comprehensive penetration tests effortlessly. Scan, exploit, and analyze…

ScubaGear – Ensuring Microsoft 365 Security Compliance

11 months ago

ScubaGear is an assessment tool that verifies that a Microsoft 365 (M365) tenant’s configuration conforms to the policies described in…

GhostStrike – The Shadows Of Advanced Cybersecurity Operations

11 months ago

GhostStrike is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing…

Leveraging eBPF For Advanced Kubernetes Monitoring

11 months ago

eBPF, or Extended Berkeley Packet Filter, is a technology that lets programs run in the Linux kernel. It was first…

ECS Logs Collector – Essential Tool For Amazon ECS Troubleshooting

11 months ago

This project was created to collect Amazon ECS log files and Operating System log files for troubleshooting Amazon ECS customer support cases.…

GOAD – A Comprehensive Guide To The Ultimate Active Directory Pentest Lab

11 months ago

GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active…

Amoco – Advancing Symbolic Binary Analysis In Python

11 months ago

Amoco is a cutting-edge Python package designed for the symbolic analysis of binaries, streamlining the decoding process across various architectures.…

Wazuh v4.9.0 – Comprehensive Overview Of Latest Enhancements And Fixes

11 months ago

Its latest enhancements and fixes that fortify cybersecurity measures. This version introduces significant improvements across its Manager and Agent components,…

DeadPotato – Harnessing Advanced System Tools For Security And Administration

11 months ago

The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new capabilities…