debugHunter : Discover Hidden Debugging Parameters And Uncover Web Application Secrets
debugHunter is used to discover hidden debugging parameters and uncover web application secrets
This Chrome extension scans websites for debugging parameters and notifies you when...
Unveiling the Power of John the Ripper: A Password Cracking Tool
Passwords are the first line of defense for most computer systems and online accounts. A strong, complex password can help thwart hackers and unauthorized...
Pinacolada : Wireless Intrusion Detection System For Hak5’s WiFi Coconut
Pinacolada is a Wireless Intrusion Detection System for Hak5's WiFi Coconut.
Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as...
QuadraInspect : Android Framework Providing A Powerful Tool For Analyzing The Security Of Android...
QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security of Android applications.
The security of...
Reportly : An AzureAD User Activity Report Tool
Reportly is an AzureAD user activity report tool.
About the tool
This is a tool that will help blue teams during a cloud incident. When running...
How to Use Ettercap to Intercept and Sniff Passwords
For man-in-the-middle attacks, Ettercap is a complete suite. It includes live connection sniffing, real-time content filtering, and other intriguing techniques.
It has many network and...
WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance
WindowSpy is a Cobalt Strike Beacon Object File meant for targetted user surveillance. The goal of this project was to trigger surveillance capabilities only...
SilentMoonwalk – PoC Implementation Of A Fully Dynamic Call Stack Spoofer
SilentMoonwalk is a PoC Implementation of a fully dynamic call stack spoofer.
TL;DR
SilentMoonwalk is a PoC implementation of a fully dynamic call stack spoofer,...
Mimicry : Security Tool For Active Deception In Exploitation And Post-Exploitation
Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation.
Active deception can live migrate the attacker to the...
How to Use the Snort IDS/IPS Complete Practical Guide
Snort is a widely used open-source Network Intrusion Detection System (NIDS) that can analyze network traffic and detect potential security threats.
It works by...