Cyber security

FireFox OSINT And Security Researcher Configuration – A Guide To Enhancing Firefox For Security Investigations

Configure FireFox with Security and Intelligance features for OSINT and Security Investigations. This repo is in early alpha. Do not…

10 months ago

libelfmaster – Pioneering Secure And Versatile ELF Parsing

libelfmaster is a C library for loading and parsing ELF objects of any type. The goal of this project was…

10 months ago

Karma v2 – The Ultimate Tool For Enhanced Cybersecurity Research

???????????????????? ???????? can be used by Infosec Researchers, Penetration Testers, Bug Hunters to find deep information, more assets, WAF/CDN bypassed…

10 months ago

Tracee – Harnessing eBPF For Enhanced System Security And Observabilit

Tracee is a runtime security and observability tool that helps you understand how your system and applications behave.It is using eBPF…

10 months ago

Cloud OSINT – Navigating Tools, Techniques, And Resources For Effective Cloud Intelligence

A repository with information related to different resources, tools, and techniques related to Cloud OSINT. Cloud OSINT (Open Source Intelligence)…

10 months ago

DaProfiler – A Comprehensive OSINT Toolkit For Digital Identity Tracing

DaProfiler is an OSINT tool capable of tracing the digital identity of a target via social networks, emails, public information…

10 months ago

OnionSearch – Navigating The Depths Of The Dark Web

OnionSearch is a powerful Python3 tool designed for scraping URLs from various ".onion" search engines on the dark web. Ideal…

10 months ago

Firefox For OSINT And Security Research – A Guide For Cybersecurity Enthusiasts

In the evolving landscape of cybersecurity, having the right tools is crucial for effective security investigations. This article explores how…

10 months ago

Pelicam – Enhancing Network Security through IP Camera Vulnerability Detection

Pelicam is an open-source project developed to improve local network security by identifying and raising awareness of IP camera vulnerabilities.…

11 months ago

Ethical Hacking Using John The Ripper : A Step-by-Step Guide To Password Cracking

This repository contains a set of shell scripts designed to facilitate the ethical hacking process using John the Ripper, a…

11 months ago