Cyber security

SHIMME – Manipulating Shim And Office For Code Injection

In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms. The "ShimMe" talk introduced…

1 year ago

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

1 year ago

v2.4.11 – Enhancements, Fixes, And Community Growth

Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.…

1 year ago

tfsec – Migrating To Trivy For Enhanced Infrastructure As Code Security

As part of our goal to provide a comprehensive open source security solution for all, we have been consolidating all…

1 year ago

CyberChef Server – A Comprehensive Guide To Setting Up And Using A CyberChef API

CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages…

1 year ago

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…

1 year ago

NodeSecure – Advanced JavaScript AST Analysis For Detecting Malicious Code

JavaScript AST analysis. This package has been created to export theĀ NodeSecureĀ AST Analysis to enable better code evolution and allow better…

1 year ago

SecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories

Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time…

1 year ago

Firefly : Revolutionizing Security Testing With Advanced Black-Box Fuzzing

Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing…

1 year ago

Checking PCAP Data – Essential Tools And Methods For Cybersecurity Analysis

In this guide, we delve into the essentials of checking PCAP data for cybersecurity professionals. Learn how to effectively use…

1 year ago