EasyEASM : Your Zero-Dollar Solution For Attack Surface Management

10 months ago

Easy EASM is just that... the easiest to set-up tool to give your organization visibility into its external facing assets.…

PMKID WPA2 Cracker – Decrypting WPA2 WiFi Networks The Easy Way

10 months ago

This program is a tool written in Python to recover the pre-shared key of a WPA2 WiFi network without any…

CloudRecon – Uncovering Hidden Cloud Assets With SSL Certificate Analysis

10 months ago

In the ever-evolving landscape of cybersecurity, red teamers and bug hunters are constantly seeking new tools to aid in their…

PipeViewer – Exploring Windows Named Pipes For Security And Permissions

11 months ago

PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is…

MetaHub – Revolutionizing Vulnerability Management With Contextual Impact Evaluation

11 months ago

MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS…

Nysm : Unveiling The Art Of Stealthy eBPF Post-Exploitation Containers

11 months ago

In the ever-evolving landscape of cybersecurity, offensive tools based on eBPF (Extended Berkeley Packet Filter) have gained popularity, from credential…

Exploring Best EDR Of The Market (BEOTM) : Unveiling User-Mode Evasion Techniques and Defensive Strategies

11 months ago

BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding…

Valid8Proxy: Streamlining Proxy Management for Web Scraping and Network Security

11 months ago

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…

CATSploit: Revolutionizing Automated Penetration Testing with Cyber Attack Techniques Scoring (CATS) Method

11 months ago

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

11 months ago

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…