Cyber security

Cyber Detective’s OSINT Tools Collection

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…

3 months ago

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…

3 months ago

Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…

3 months ago

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…

3 months ago

Voidgate – Advanced Technique To Bypass AV/EDR Memory Scanners

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…

3 months ago

CyberChef – The Ultimate Cyber Swiss Army Knife

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These…

3 months ago

CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass

According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…

3 months ago

DumpMDEConfig – Extracting Microsoft Defender Configuration And Logs With PowerShell Script

Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…

3 months ago

Detection Lab – A Comprehensive Overview Of Its Features, Documentation, And Legacy

This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build…

3 months ago

Holehe OSINT – Email To Registered Accounts

Holehe checks if an email is attached to an account on sites like twitter, instagram, imgur and more than 120…

3 months ago