Nessusploitable – Targeting Exploitable Nessus Vulnerabilities

1 year ago

Do you need to filter Nessus scan results and zero in on exploitable vulnerabilities? When you're on a penetration test…

AttackGen – Tailored Cyber Incident Response Testing

1 year ago

AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…

Azure AD Attack & Defense Playbook

1 year ago

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated…

TinyCheck – Spotting Malicious Networks With Ease

1 year ago

Description TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to…

ProtoBurp++: Elevating Protobuf Security Research

1 year ago

A game-changer in cybersecurity tooling, designed to take Protobuf fuzzing and encoding in Burp Suite to new heights. Dive in…

Donut-Decryptor : Unmasking Binary Secrets

1 year ago

Navigating the maze of binary obfuscation? Meet the "Donut-Decryptor", a tool tailored to decode the elusive Donut obfuscation. Dive in…

BucketLoot – An Automated S3 Bucket Inspector

1 year ago

Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who…

Kubetools – A Curated List of Kubernetes Tools

1 year ago

There are more than 450+ Kubernetes Certified Service Providers and tons of Kubernetes Certified distributions. Choosing a right distribution can be a daunting…

Caro Kann – Evading Kernel Scans with Encrypted Shellcode

1 year ago

In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils…

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

1 year ago

Secure Shell Bruteforcer - A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are…