Kali Linux

Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

Priv2Admin idea is to "translate" Windows OS privileges to a path leading to: administrator,integrity and/or confidentiality threat,availability threat,just a mess.…

4 years ago

7 Ways in Which You Can Keep Yourself Safe on the Internet

It's easy to find ways to stay safe on the internet. With today's technology, you can stay connected with loved…

4 years ago

Kiterunner : Contextual Content Discovery Tool

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective…

4 years ago

Red-Detector : Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io

Red-Detector is a tool to Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance…

4 years ago

Evasor : A Tool To Be Used In Post Exploitation Phase For Blue

The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be…

4 years ago

CANalyse : A Vehicle Network Analysis And Attack Tool

CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect…

4 years ago

Judge Jury And Executable : A File System Forensics Analysis Scanner & Threat Hunting Tool

Judge Jury And Executable is a File System Forensics Analysis Scanner And Threat Hunting Tool Features Scan a mounted filesystem…

4 years ago

KubeArmor : Container-aware Runtime Security Enforcement System

Introduction to KubeArmor KubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file…

4 years ago

Botkube : An App That Helps You Monitor Your Kubernetes Cluster, Debug Critical Deployments And Gives Recommendations For Standard Practices

BotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug critical deployments and gives recommendations for standard practices by running…

4 years ago

Duplicut : Remove Duplicates From MASSIVE Wordlist, Without Sorting It

Duplicut is a modern password wordlist creation usually implies concatenating multiple data sources. Ideally, most probable passwords should stand at…

4 years ago