CLay – Enhancing Web Security hrough Deceptive Reverse Proxies

11 months ago

CLay offers a unique and powerful feature that goes beyond traditional security measures. CLay takes deception to a new level…

Entraspray – Enhancing Password Spraying Tools For Microsoft Azure Security

11 months ago

Entraspray is a rewrite of MSOLSpray in python. The main purpose of this tool remains the same: to perform password spraying against…

IAT-Tracer V2 : Streamlining API Function Tracing For Enhanced Cybersecurity

11 months ago

IAT-Tracer V2 is a plugin for Tiny-Tracer framework (by @hasherezade) for automatically detecting and resolving functions' parameters out of the IAT or…

Gouge – The Essential Burp Suite Extension For URL Extraction

11 months ago

Gouge is a Burp Suite extension to extract or GOUGE all URLs. It is a Burp Suite extension written in…

Microsoft-Analyzer-Suite (Community Edition) : A Deep Dive Into Analyzing Microsoft 365 Security

11 months ago

Explore the capabilities of the Microsoft-Analyzer-Suite (Community Edition), a powerful collection of PowerShell scripts designed to enhance your security analysis.…

Cloud_Enum – Advancing Cloud Security Through Multi-Cloud OSINT Tools

11 months ago

I built this tool in 2019 for a pentest involving Azure, as no other enumeration tools supported it at the…

EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers

11 months ago

EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project…

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

11 months ago

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in…

Manual Exploits – Assessing Device Security Through Direct Interaction

11 months ago

This check could be used to assess the severity of the attacks. If the target device is pairable even if…

Workflow – Comprehensive Guide To Using BlueToolkit For Bluetooth Vulnerability Testing

11 months ago

The toolkit has several ways it could be used, due to its modular nature, but the main feature of it…