Cyber security

v1.0.0 – Elevating Cybersecurity And System Management Capabilities

The latest v1.0.0 release marks a significant advancement in cybersecurity and system management tools, introducing a host of new features…

2 years ago

Abusing Family Refresh Tokens For Unauthorized Access And Persistence In Azure Active Directory

In the evolving landscape of cloud security, a novel vulnerability within Azure Active Directory (Azure AD) exposes a critical risk…

2 years ago

Lucid – Revolutionizing Fuzzing Through Bochs Emulation Technology

Lucid is an educational fuzzing project which aims to create a Bochs emulator based snapshot fuzzer capable of fuzzing traditionally…

2 years ago

CVE-2024-25600_Nuclei-Template : Unveiling Remote Code Execution In WordPress’s Bricks Plugin

In the digital landscape of WordPress themes and plugins, a critical vulnerability has emerged with the potential to compromise website…

2 years ago

Nmap Analysis Tool – Enhancing Network Security Through Advanced Analysis And Reporting

This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two…

2 years ago

ADeleg – Mastering Active Directory Delegation Management

Is an Active Directory delegation management tool. It allows you to make a detailed inventory of delegations set up so…

2 years ago

SSH-Snake : Automated SSH-Based Network Traversal

SSH-Snake is a powerful tool designed to perform automatic network traversal using SSH private keys discovered on systems, with the…

2 years ago

Mr.Handler – The Ultimate Tool For Linux Security Incident Response And System Analysis

MR.Handler is a specialized tool designed for responding to security incidents on Linux systems. It connects to target systems via…

2 years ago

SwaggerSpy – Elevating API Security Through OSINT On SwaggerHub

SwaggerSpy is a tool designed for automated Open Source Intelligence (OSINT) on SwaggerHub. This project aims to streamline the process…

2 years ago

UAC-BOF-Bonanza : Elevating Access With Advanced Bypass Methods

This repository serves as a collection of public UAC bypass techniques that have been weaponized as BOFs. A single module…

2 years ago