MEID-SignIns-TorExitNodes : Leveraging Microsoft Sentinel To Monitor And Manage Tor Network Access

1 year ago

This KQL query retrieves all Tor exit nodes from the official tor project website. Tor exit nodes are the gateways…

MultCheck : A User-Friendly, Open-Source Malware AV Testing Tool

1 year ago

An innovative, open-source tool designed to streamline malware analysis by testing the effectiveness of multiple antivirus (AV) engines simultaneously. Developed…

CLay – Enhancing Web Security hrough Deceptive Reverse Proxies

1 year ago

CLay offers a unique and powerful feature that goes beyond traditional security measures. CLay takes deception to a new level…

Entraspray – Enhancing Password Spraying Tools For Microsoft Azure Security

1 year ago

Entraspray is a rewrite of MSOLSpray in python. The main purpose of this tool remains the same: to perform password spraying against…

IAT-Tracer V2 : Streamlining API Function Tracing For Enhanced Cybersecurity

1 year ago

IAT-Tracer V2 is a plugin for Tiny-Tracer framework (by @hasherezade) for automatically detecting and resolving functions' parameters out of the IAT or…

Gouge – The Essential Burp Suite Extension For URL Extraction

1 year ago

Gouge is a Burp Suite extension to extract or GOUGE all URLs. It is a Burp Suite extension written in…

Microsoft-Analyzer-Suite (Community Edition) : A Deep Dive Into Analyzing Microsoft 365 Security

1 year ago

Explore the capabilities of the Microsoft-Analyzer-Suite (Community Edition), a powerful collection of PowerShell scripts designed to enhance your security analysis.…

Cloud_Enum – Advancing Cloud Security Through Multi-Cloud OSINT Tools

1 year ago

I built this tool in 2019 for a pentest involving Azure, as no other enumeration tools supported it at the…

EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers

1 year ago

EDRPrison leverages a legitimate WFP callout driver, WinDivert, to effectively silence EDR systems. Drawing inspiration from tools like Shutter, FireBlock, and EDRSilencer, this project…

Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue, And Automated Techniques

1 year ago

You need to buy the following hardware to be able to run the exploits: The installation is partially automated in…