Advertisement

Face Recognition – Mastering Facial Recognition With Python

0
Recognize and manipulate faces from Python or from the command line with the world's simplest face recognition library. Built using dlib's state-of-the-art face recognition built with...

Crime Data Explorer : An In-Depth Look At FBI’s Open Crime Data Initiative

0
The FBI collects and publishes Uniform Crime Reporting (UCR) data on an annual basis. Over 18,000 law enforcement agencies across the country voluntarily participate in the...

XMGoat – Mastering Azure Security Through Hands-On Attack Scenario

0
XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template is a vulnerable environment,...

Hfinger – Fingerprinting Malware HTTP Requests

0
Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage. Its main objective is to provide unique representations...

Awesome-Mobile-CTF : The Ultimate Guide To Mobile Capture The Flag Challenges And Resources

0
This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based due to the popularity...

teler : Version 3 With Enhanced Capabilities And Community-Driven Development

0
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community.  Note If you...

Cyber Detective’s OSINT Tools Collection

0
Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the links from my tweets...

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

0
Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed with support from powerful...

Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

0
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one solution for detecting secrets, past...

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

0
Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted by regex from Abuse...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...
file command

 The file Command – Quickly Identify File Contents in Linux

0
While file extensions in Linux are optional and often misleading, the file command helps decode what a file truly is. This powerful utility analyzes the actual...
touch command

How to Use the touch Command in Linux

0
The touch command is one of the quickest ways to create new empty files or update timestamps for existing files in Linux. It’s widely used by...
find command

How to Search Files and Folders in Linux Using the find Command

0
Handling large numbers of files is routine for Linux users, and that’s where the find command shines. It’s a dynamic tool that helps you search for...
mv command

How to Move and Rename Files in Linux with the mv Command

0
Managing files and directories is foundational for Linux workflows, and the mv (“move”) command makes it easy to relocate or rename items without hassle. Whether organizing...