Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage. Its main objective…
This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…
Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…
Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…
Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These…
According to Veeam official advisory, all the versions BEFORE Veeam Backup Enterprise Manager 12.1.2.172 are vulnerable Usage First, you need to have…