OWASP WrongSecrets: Multi-Tenant CTF Party Setup

0
Welcome to OWASP WrongSecrets CTF Party, where Capture The Flag tasks meet scalability without any problems. Our platform is made for dynamic, multi-tenant CTF...

Supernova : The Ultimate Shellcode Encryption & Conversion Toolkit

0
Meet Supernova, the new and improved shellcode encryption tool made for today's ethical hackers. Supernova is written in Golang and works with both Windows...

EDRSandblast-GodFault: Advanced EDR Bypass Tool

0
EDRSandblast-GodFault is an advanced EDR bypass tool aimed at security researchers and organizations. Its purpose is to evaluate the effectiveness of current EDR systems...

Prebuilt Multi-Arch Binaries for Enhanced Device Management

0
Prebuilt binaries for multiple architeture (arm, armeb, aarch64, aarch64_be, mips, mips1, mipsel, mipsel1, mips64, mips64el, powerpc, powerpc64, powerpc64le, riscv64, i586, x86_64) All binaries are statically...

Empowering Frontline Workers: Streamline Device Management For An Enhanced Employee Experience

0
In today's fast-paced world, frontline workers play a vital role in delivering services and products directly to customers. From healthcare providers and retail associates...

TelegramRAT – A Tool To Bypass Restricted Communications

0
A cross-platform Remote Access Tool that operates through Telegram, leveraging the secure messaging app for covert communication. Designed to navigate around network restrictions, TelegramRAT...

NucleiFuzzer – An Automation Tool

0
NucleiFuzzer is an automation tool that combines and enhances web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities.  NucleiFuzzer streamlines the...

BadZure – A PowerShell To Set Up Azure Active Directory Tenants

0
BadZure is a PowerShell script that uses the Microsoft Graph SDK to set up Azure Active Directory tenants. It fills them with different entities...

CVE-2023-38035 – Arbitrary Command Execution As The Root user On Ivanti Sentry

0
Ivanti has just put out a warning about CVE-2023-38035. The vulnerability has been added to CISA KEV and is called an authentication bypass in...

PwnFox – A Firefox/Burp Extension For Security Audit

0
PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit. If you are a chrome user you can check https://github.com/nccgroup/autochrome. PwnFox Features Single click BurpProxy Containers Profiles PostMessage...
cp command

cp Command: Copy Files and Directories in Linux

0
The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether making a backup, organizing a project, or moving content, cp allows...
image osint

Image OSINT

0
Introduction In digital investigations, images often hold more information than meets the eye. With the right tools and techniques, analysts can uncover hidden metadata, find...
cat Command

cat Command: Read and Combine File Contents in Linux

0
The cat command short for concatenate, It is a fast and versatile tool for viewing and merging file contents directly from the Linux terminal. Whether you're...
ports in networking

Port In Networking

0
What is a Port? A port in networking acts like a gateway that directs data to the right program on a device. An IP address...
ls command

ls Command: List Directory Contents in Linux

0
The ls command is fundamental for anyone working with Linux. It’s used to display the files and directories in your current location, helping you stay organized...