EasyEASM : Your Zero-Dollar Solution For Attack Surface Management

1 year ago

Easy EASM is just that... the easiest to set-up tool to give your organization visibility into its external facing assets.…

PMKID WPA2 Cracker – Decrypting WPA2 WiFi Networks The Easy Way

1 year ago

This program is a tool written in Python to recover the pre-shared key of a WPA2 WiFi network without any…

CloudRecon – Uncovering Hidden Cloud Assets With SSL Certificate Analysis

1 year ago

In the ever-evolving landscape of cybersecurity, red teamers and bug hunters are constantly seeking new tools to aid in their…

PipeViewer – Exploring Windows Named Pipes For Security And Permissions

1 year ago

PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is…

MetaHub – Revolutionizing Vulnerability Management With Contextual Impact Evaluation

1 year ago

MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management. You can use it with AWS…

Nysm : Unveiling The Art Of Stealthy eBPF Post-Exploitation Containers

1 year ago

In the ever-evolving landscape of cybersecurity, offensive tools based on eBPF (Extended Berkeley Packet Filter) have gained popularity, from credential…

Exploring Best EDR Of The Market (BEOTM) : Unveiling User-Mode Evasion Techniques and Defensive Strategies

1 year ago

BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) project, designed to serve as a testing ground for understanding…

Valid8Proxy: Streamlining Proxy Management for Web Scraping and Network Security

1 year ago

Valid8Proxy is a versatile and user-friendly tool designed for fetching, validating, and storing working proxies. Whether you need proxies for…

CATSploit: Revolutionizing Automated Penetration Testing with Cyber Attack Techniques Scoring (CATS) Method

1 year ago

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.…

Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.

1 year ago

The article "Demonized Shell: Advancing Linux Persistence Techniques and Security Implications" goes into great detail about D3m0n1z3dShell, a complex tool…