Cyber security

Nipe – Pioneering Privacy And Anonymity On The Internet With Tor

The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…

3 months ago

v2.4.11 – Enhancements, Fixes, And Community Growth

Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.…

3 months ago

tfsec – Migrating To Trivy For Enhanced Infrastructure As Code Security

As part of our goal to provide a comprehensive open source security solution for all, we have been consolidating all…

4 months ago

CyberChef Server – A Comprehensive Guide To Setting Up And Using A CyberChef API

CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages…

4 months ago

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and…

4 months ago

NodeSecure – Advanced JavaScript AST Analysis For Detecting Malicious Code

JavaScript AST analysis. This package has been created to export theĀ NodeSecureĀ AST Analysis to enable better code evolution and allow better…

4 months ago

SecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories

Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time…

4 months ago

Firefly : Revolutionizing Security Testing With Advanced Black-Box Fuzzing

Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing…

4 months ago

Checking PCAP Data – Essential Tools And Methods For Cybersecurity Analysis

In this guide, we delve into the essentials of checking PCAP data for cybersecurity professionals. Learn how to effectively use…

4 months ago

Hardware YAML DSL – A Guide To Specifications

In the ever-evolving landscape of cybersecurity, the configuration and management of hardware profiles are crucial for effective security protocols. The…

4 months ago