DarkFlare : Bypassing Censorship With TCP-Over-CDN Technology

0
A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and comfortable. Now with public test relay servers! What Is This...

SkyScalpel : The Art Of Cloud Policy Obfuscation And Detection

0
SkyScalpel is an open-source framework for JSON policy parsing, obfuscation, deobfuscation, and detection in cloud environments. It provides flexible and highly configurable mechanisms to...

RevC2 : Websocket Setup Secure Testing Guide

0
This Python script emulates the websocket server side of RevC2 by sending the type you select and rendering the response. Please make sure you...

Genzai : The Ultimate IoT Security Toolkit – Setup, Features, And Usage

0
The tool is written in Go, so make sure to install it on your system before proceeding. The setup is pretty easy and straight...

DICOMHawk – A Honeypot For Secure DICOM Server Monitoring

0
DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions. Built using Flask and...

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

0
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service) memory, often needed in penetration testing and red teaming...

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

0
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation while leveraging Rust’s safety and performance features. This project...

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

0
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within the Chromium web browser which allowed for a sandbox...

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

0
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP parser that handles tokenization and...

go-exploitdb : A Comprehensive Guide To Managing Exploit Databases

0
This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched by command line interface....
whatsmyname

WhatsMyName App – Find Anyone Across 640+ Platforms

0
Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists across hundreds of platforms worldwide. It’s widely used by investigators,...
Analyzing Directory Size Linux Tools Explained

Analyzing Directory Size Linux Tools Explained

0
Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which directories consume the most space helps in optimizing system...
Understanding Disk Usage with du Command

Understanding Disk Usage with du Command

0
Efficient disk space management is vital in Linux, especially for system administrators who manage servers or large directories. The du command (short for disk...
How to Check Directory Size in Linux

How to Check Directory Size in Linux

0
Knowing how to check directory sizes in Linux is essential for managing disk space and keeping your system organized. Linux provides several built-in tools...
Essential Commands for Linux User Listing

Essential Commands for Linux User Listing

0
Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a server or auditing system access, knowing how to list...