Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…
Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…
Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These…
According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…
Invoke-DumpMDEConfig is a PowerShell script designed to extract and display Microsoft Defender configuration and logs, including excluded paths, enabled ASR rules,…
This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build…
Holehe checks if an email is attached to an account on sites like twitter, instagram, imgur and more than 120…