SHIMME – Manipulating Shim And Office For Code Injection
In the ever-evolving landscape of cybersecurity, DEFCON 32 unveiled pioneering tools that challenge traditional security paradigms.
The "ShimMe" talk introduced two groundbreaking tools: the...
Nipe – Pioneering Privacy And Anonymity On The Internet With Tor
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism.
It is used by a...
v2.4.11 – Enhancements, Fixes, And Community Growth
Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront.
This update introduces robust...
tfsec – Migrating To Trivy For Enhanced Infrastructure As Code Security
As part of our goal to provide a comprehensive open source security solution for all, we have been consolidating all of our scanning-related efforts...
CyberChef Server – A Comprehensive Guide To Setting Up And Using A CyberChef API
CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages other than JavaScript.
By...
Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands
This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and PowerView commands, how to...
NodeSecure – Advanced JavaScript AST Analysis For Detecting Malicious Code
JavaScript AST analysis. This package has been created to export the NodeSecure AST Analysis to enable better code evolution and allow better access to developers and...
SecretMagpie – The Comprehensive Secret Detection Tool For Your Repositories
Organisations struggle to scan for leaked secrets in ALL of their repos. It's easy to scan one repo, but time consuming and tedious to...
Firefly : Revolutionizing Security Testing With Advanced Black-Box Fuzzing
Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly provides the advantage of testing a target with a...
Checking PCAP Data – Essential Tools And Methods For Cybersecurity Analysis
In this guide, we delve into the essentials of checking PCAP data for cybersecurity professionals. Learn how to effectively use tools like Wireshark and...