Vulnerability Analysis Tools
LummaC2 is a commodity malware designed as an information stealer, targeting browsers, cryptocurrency wallets, and authentication data. Marketed as a…
Bug bounty hunting has become a highly rewarding field, enabling security researchers to identify vulnerabilities and earn rewards. To excel…
Apache Iceberg™ Rust is a native Rust implementation of the Apache Iceberg table format, designed for managing large-scale datasets in…
DockerSpy is a powerful tool designed to perform Open Source Intelligence (OSINT) on Docker Hub, a repository for sharing and…
Ghidra is a powerful open-source Software Reverse Engineering (SRE) framework developed by the U.S. National Security Agency (NSA). Designed to…
MEGR-APT is an advanced and scalable system designed for hunting Advanced Persistent Threats (APTs) by identifying suspicious subgraphs that align…
A Proof of Concept (PoC) repository is a valuable tool in the cybersecurity landscape, designed to demonstrate the exploitation of…
The release of YARA-X v0.13.0 introduces several enhancements, bug fixes, and new tools aimed at improving the functionality and user…
CVE-2025-21298 is a critical zero-click vulnerability in Windows Object Linking and Embedding (OLE) technology, which enables embedding and linking to…
The rust-libp2p repository is the central hub for developing the Rust implementation of the libp2p networking stack, a modular and…