FinalRecon : The Ultimate All-In-One Web Reconnaissance Tool
FinalRecon is an all in one automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple. Available In Features FinalRecon provides detailed information such as : Header Information Whois SSL Certificate Information Crawler html CSS Javascripts Internal Links External Links Images robots sitemaps Links inside Javascripts Links from Wayback...
ArtifactCollector : Unlocking Digital Forensics – A Comprehensive Guide
The artifactcollector project provides a software that collects forensic artifacts on systems. These artifacts can be used in forensic investigations to understand attacker behavior on compromised computers. Features The artifactcollector offers the following features ️Runs on Windows, Linux and macOS Can extract files, directories, registry entries, command and WMI output Uses the configurable and extensible Forensics Artifacts Creates a forensicstore as structured output It's open source Free for everyone...
VolWeb – Empowering Digital Forensics With Advanced Memory Analysis Tools
VolWeb is a digital forensic memory analysis platform that leverages the power of the Volatility 3 framework. It is dedicated to aiding in investigations and incident responses. Objective The goal of VolWeb is to enhance the efficiency of memory collection and forensic analysis by providing a centralized, visual, and enhanced web application for incident responders and digital forensics investigators. Once an...
Awesome Prompt Injection – Understanding And Mitigating AI Model Vulnerabilities
'Awesome Prompt Injection' delves into the intricate world of machine learning vulnerabilities, spotlighting the cunning exploits known as prompt injections. Discover how malicious actors manipulate AI models, explore cutting-edge research, and arm yourself with tools to fortify against these stealthy attacks. Learn about a type of vulnerability that specifically targets machine learning models. Contents Introduction Articles and Blog posts Tutorials Research Papers Tools CTF Community Introduction Prompt injection is...
Awesome Security Card Games – Mastering Cybersecurity Through Play
Security card games help train your skills and enable discussions for various areas of security. Mastering Cybersecurity Through Play,' your essential guide to the innovative world of security card games. These games aren't just entertaining; they're powerful tools designed to sharpen your skills and foster critical discussions across various domains of security. From application security to threat modeling, we've...
Awesome Password Cracking : Unlocking The Code – A Comprehensive Guide To Tools And Techniques
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form. A common approach (brute-force attack) is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password. This is a curated list of...
Perfect DLL Proxy – Streamlining DLL Hijacking With Absolute Path Forwarding
In the complex landscape of cybersecurity, DLL hijacking stands out as a notable technique for exploiting software vulnerabilities. This article introduces "Perfect DLL Proxy," a sophisticated method that refines the traditional approach to DLL hijacking. By leveraging a unique trick that utilizes absolute paths for forwarding, it bypasses the limitations of ASM stubs, offering a cleaner, more efficient proxy...
v9.8.0 – Catch ‘Em All: Network Vulnerabilities : A Deep Dive Into The Latest Nuclei Templates Release
We're thrilled to share that with the launch of Nuclei Templates version 9.8.0, we've broadened our scope in network security checks. Our template library now boasts over 8,000 entries, encompassing more than 7,202 templates for web applications. This collection includes 2,200 web-related CVEs and features more than 850 templates aimed at identifying web vulnerabilities. With the help of active community...
AutoSmuggle – Revolutionizing File Transfer With HTML Smuggling
A Utility to quickly create your HTML smuggled files. It is based on the blog post by Outflank. AutoSmuggle emerges as a groundbreaking utility designed to redefine the way digital files are transferred securely and efficiently. Inspired by Outflank's insightful exploration into HTML smuggling, this tool provides a seamless method for converting binaries into smuggled HTML or SVG files....
Awesome Embedded And IoT Security – Key Tools And Insights
Botnets like Mirai have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. If you are a beginner, you should have a look at the Books and Case Studies sections. If you want to start right away with your own analysis, you should give the Analysis Frameworks a try. They...