Akto.io – Comprehensive Security Testing And Inventory Management

11 months ago

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

CCC : Cyberspace Under Siege – Understanding Crime, Espionage, And Conflict

11 months ago

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The…

Freeway – A Comprehensive Guide To WiFi Penetration Testing With Python

11 months ago

"Freeway" is a Python-based tool designed to enhance WiFi penetration testing and network security. Utilizing the capabilities of Scapy, it…

ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes

11 months ago

Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata…

VMware vCenter : CVE-2024-37081 Proof Of Concept

11 months ago

Este repositorio contiene una prueba de concepto (PoC) para la vulnerabilidad CVE-2024-37081 en VMware vCenter. La vulnerabilidad se debe a…

DetectItEasy With Python – A Comprehensive Guide

11 months ago

DetectItEasy-Python is a powerful tool designed to streamline file scanning and analysis using Python bindings. This article guides you through…

Volatility Binaries – A Comprehensive Guide To Compiling And Using Volatility Tools

11 months ago

Explore the essentials of Volatility binaries with our detailed guide. This article provides easy access to compiled binaries of Volatility,…

Mailgoose – Ensuring Email Security With SPF, DMARC, And DKIM Verification

11 months ago

Mailgoose is a web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set…

BGPipe – BGP Reverse Proxy And Firewall

12 months ago

An innovative open-source tool that revolutionizes BGP management by acting as a reverse proxy and firewall. Leveraging the powerful BGPFix…

Sinon – Modular Windows Burn-In Automation With Generative AI For Deception

12 months ago

Sinon is a modular tool for automatic burn-in of Windows-based deception hosts that aims to reduce the difficulty of orchestrating…