SecureSphere Labs – A Haven For Cybersecurity Innovators And Ethical Hackers
Welcome to SecureSphere Labs, your go-to destination for a curated collection of powerful hacking tools designed for cybersecurity professionals, ethical hackers, and security enthusiasts...
Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs
All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained by @Fenrir.pro.
It is based on Alpine Linux, clutter-free, lightweight and actively...
Termo-Kali : A Guide To Installing Kali Linux On Android via Termux
Termo-Kali bridges the gap between powerful Linux capabilities and the convenience of mobile devices by bringing Kali Linux to Android through Termux.
This guide...
Certified Ethical Hacker Quiz – Sharpen Your Skills With The CEH v12 Interactive Application
Welcome to the Ethical Hacking Quiz Application, designed to help learners test their knowledge of the Certified Ethical Hacker v12 curriculum.
This CLI-based tool...
WPA2 Handshake Automation Tool – A Quick Guide
The WPA2 Handshake Automation Tool is a Python3 script designed to simplify the process of setting up and capturing WPA2 handshakes.
Whether you're testing your own...
Cybersecurity Toolkit – Essential Python Tools For Penetration Testing
Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing enthusiasts.
In this article, we delve into a range...
i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity
The main objective of the creation of this laboratory is to transport the applications, tools and/or frameworks of a Linux computer environment to the...
Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing
Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate the complexities of WiFi security.
This robust tool offers...
THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping
This repository was created with the aim of assisting companies and independent researchers about Tactics, Techniques and Procedures adopted by Ransomware Operators/Groups active or...
MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities
A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue.
Presented at Black Hat Asia 2024 under...