Varshini

Sippts – The Comprehensive Guide To Auditing VoIP Security via SIP Protocol

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python…

4 months ago

Version 3.7 – Comprehensive Enhancements And New Features In SQL Server Chain Execution Tool

Complete refactor of code base. Updated documentation (code comments, README, and wiki) Execution against a linked SQL server chain. For…

4 months ago

Features Of Turtufo – Comprehensive Guide To Scanning For Secrets In Code Repositories

While tartufo started its life with one primary mode of operation, scanning the history of a git repository, it has grown other…

4 months ago

Office 365 Extractor – A Complete Guide To Extracting Audit Logs And Enhancing Forensic Investigations

This script makes it possible to extract log data out of an Office365 environment. The script created by us consist…

4 months ago

Snaffler Output File Parser – Enhancing Data Analysis With Advanced Features

Especially in large environments, the Snaffler output gets very large and time-consuming to analyze. This script parse the Snaffler output…

4 months ago

Open-Source Web Scanners : A Detailed List Of Tools From GitHub And GitLab

A list of open source web security scanners on GitHub and GitLab, ordered by Stars. It does not provide in-depth…

4 months ago

Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit

Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate…

4 months ago

Checking The Installation – A Guide To Installing And Verifying Tartuf

You can install tartufo in the usual ways you would for a Python Package, or using docker to pull the latest tartufo docker image from Docker…

4 months ago

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

4 months ago

Tempest – A Rust Journey Through Command And Control Research

This is a research command and control framework. What I mean by this, is that it is meant for research purposes.…

4 months ago