XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template…
A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.…
Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage. Its main objective…
A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,…
Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is…
Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…
Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…
Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…
Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…
This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…