Kubetools – A Curated List of Kubernetes Tools

1 year ago

There are more than 450+ Kubernetes Certified Service Providers and tons of Kubernetes Certified distributions. Choosing a right distribution can be a daunting…

Caro Kann – Evading Kernel Scans with Encrypted Shellcode

1 year ago

In the ever-evolving game of cybersecurity, encrypted shellcode injection emerges as a formidable method to sidestep defenses. This article unveils…

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

1 year ago

Secure Shell Bruteforcer - A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are…

Furlzz – Advanced iOS URL Scheme Fuzzing Made Easy

1 year ago

Furlzz is a small fuzzer written to test out iOS URL schemes. It does so by attaching to the application…

ReconAIzer – Enhancing Burp Suite With OpenAI

1 year ago

ReconAIzer is a powerful Jython extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon…

ACLToolkit – The Ultimate ACL Abuse Toolkit Guide

1 year ago

In the intricate world of cyber security, managing and understanding access control lists (ACLs) becomes paramount. 'acltoolkit' emerges as a…

CakeFuzzer – Vulnerability Detection for CakePHP

1 year ago

Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based…

ZeusCloud: The Next-Gen Open Source Cloud Security Solution

1 year ago

The field of cloud computing is growing quickly, and security threats and problems have grown at the same rate. ZeusCloud…

SysReptor: Cloud & Self-hosted Security Reporting

1 year ago

SysReptor is a fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. User…

Wallet Transaction Monitor: Real-time Bitcoin Updates & Alerts

1 year ago

This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new…