Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

1 year ago

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

1 year ago

Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…

Pacu – A Comprehensive Guide To The AWS Exploitation Framework

1 year ago

Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…

Voidgate – Advanced Technique To Bypass AV/EDR Memory Scanners

1 year ago

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…

sttr – A Command Line Tool For String Transformations

1 year ago

sttr is command line software that allows you to quickly run various transformation operations on the string. // With input prompt…

CyberChef – The Ultimate Cyber Swiss Army Knife

1 year ago

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These…

Volana – Mastering Stealth Command Execution During Penetration Testin

1 year ago

During pentest, an important aspect is to be stealth. For this reason you should clear your tracks after your passage. Nevertheless, many…

OSINT-Collector : Harnessing Advanced Frameworks For Domain-Specific Intelligence Gathering

1 year ago

OSINT-Collector is an advanced framework that facilitates the collection, analysis, and management of OSINT information useful for conducting investigations in specific domains of interest. Table Of Contents…

GoAccess : A Comprehensive Guide To Real-Time Web Log Analysis And Visualization

1 year ago

GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal on *nix systems or through your browser. It…

Wstunnel – Revolutionizing Network Access Through Advanced Tunneling Techniques

1 year ago

Most of the time when you are using a public network, you are behind some kind of firewall or proxy.…