Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage. Its main objective…
A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,…
Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is…
Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…
Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…
Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…
Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…
This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…
In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and…
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…