An innovative tool designed to revolutionize the testing, evaluation, and security of LLM applications. This versatile tool supports a test-driven…
A powerful tool designed to tunnel TCP connections through a file. Ideal for circumventing firewalls and establishing secure network links,…
If the other documentation left you wondering what to do with the results of your scans, and unsure how to…
This project showcases the vulnerability research that we conducted on Quick Share, which we presented at DEF CON 32 (2024).…
The versatile capabilities of 3proxy, a robust and lightweight proxy server designed for a variety of network tasks. From basic…
Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python…
Complete refactor of code base. Updated documentation (code comments, README, and wiki) Execution against a linked SQL server chain. For…
Especially in large environments, the Snaffler output gets very large and time-consuming to analyze. This script parse the Snaffler output…
This article provides a treasure trove of resources, including cheatsheets, detailed notes, and automation scripts, tailored for cybersecurity professionals and…
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It…