WinDiff: A Comprehensive Tool for Windows Binary Comparison and Analysis

0
WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of...

LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

0
LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX computers joined to Active...

RustHound : A Cross-Platform BloodHound Collector Tool

0
In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built with Rust, breaks down...

Wireshark 4.0.10 Released – What’s New!

0
The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol development, network monitoring, communications...

Cartographer – Advanced Code Coverage Mapping in Ghidra

0
Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a...

Donut-Decryptor : Unmasking Binary Secrets

0
Navigating the maze of binary obfuscation? Meet the "Donut-Decryptor", a tool tailored to decode the elusive Donut obfuscation. Dive in to unravel its capabilities...

BucketLoot – An Automated S3 Bucket Inspector

0
Thousands of S3 buckets are left open on the internet, which makes them an easy target for bad people who want to get private...

SSB – A Faster & Simpler Way to Bruteforce SSH Server.

0
Secure Shell Bruteforcer - A faster & simpler way to bruteforce SSH server. In the evolving world of cybersecurity, speed and efficiency are paramount. Enter Kitabisa SSB,...

ReconAIzer – Enhancing Burp Suite With OpenAI

0
ReconAIzer is a powerful Jython extension for Burp Suite that leverages OpenAI to help bug bounty hunters optimize their recon process. This extension automates...

CakeFuzzer – Vulnerability Detection for CakePHP

0
Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based on specific frameworks with...
Command-Line Techniques for Listing Linux Users

Command-Line Techniques for Listing Linux Users

0
Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing how to list users efficiently helps you audit your...
Exploring User Management in Linux Systems

Exploring User Management in Linux Systems

0
User management is a critical aspect of Linux administration. Each user in a Linux system has specific permissions, roles, and files associated with their...
How to List Users in Linux

How to List Users in Linux

0
Managing users is an essential part of Linux system administration. Knowing how to list all users helps you monitor system access, manage permissions, and...
Nmap Cheat Sheet

Nmap cheat sheet for beginners

0
Nmap (Network Mapper) is a free tool that helps you find devices on a network, discover open ports, and identify services running on those...
MCP

Understanding the Model Context Protocol (MCP) and How It Works

0
Introduction to the Model Context Protocol (MCP) The Model Context Protocol (MCP) is an open standard that enables AI applications, such as large language models,...