Nipe – Pioneering Privacy And Anonymity On The Internet With Tor
The Tor project allows users to surf the Internet, chat and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for lawful activities and for other illicit purposes. Tor has been largely used by intelligence agencies, hacking groups, criminal activities and even ordinary users who care about...
Project Apeman : A Comprehensive Guide To Graph-Based AWS Security Analysis
Project Apeman is an advanced tool for security professionals, designed to streamline the analysis of AWS environments using a graph-based approach. This guide offers detailed instructions on setting up and deploying Project Apeman, including system requirements, installation steps, and data ingestion. Get ready to enhance your security posture with this powerful and efficient tool. System Requirements Tested On Windows 11 Ubuntu 22 12 GB...
TCA – A Comprehensive Toolkit For Code Analysis And Quality Assurance
Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages. Code analysis is a technology, using lexical...
2024-PocLib : Comprehensive Vulnerability And Security Exploit Overview
The 2024-PocLib project serves as a crucial resource for cybersecurity enthusiasts and researchers, offering a detailed compilation of the latest vulnerabilities and security threats identified across various platforms. This article presents an exhaustive list of exploits and security loopholes, highlighting the importance of staying informed and proactive in the cybersecurity landscape. From common software vulnerabilities to critical infrastructure exploits,...
v2.4.11 – Enhancements, Fixes, And Community Growth
Dive into the latest advancements with the release of v2.4.11, which brings significant enhancements and new features to the forefront. This update introduces robust GraphQL support, multi-factor authentication, and innovative versioning for notes. Explore the contributions from the community and key fixes that enhance functionality and security in this detailed release summary. What's Changed Add GraphQL support on some endpoints Add MFA...
WhenFS – Transforming Google Calendar Into A Whimsical File System
A novel technology that reimagines Google Calendar as a whimsical file system. This quirky tool allows you to create, read, and write files directly within your calendar, transforming it into a FUSE filesystem. Dive into the capabilities of WhenFS, from mounting shared calendars to transferring files at unprecedented speeds—all through the simplicity of your daily scheduler. WhenFS turns your Google...
Themida-Unmutate : Mastering Deobfuscation Of Protected Software
A Python 3 tool to statically deobfuscate functions protected by Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.The tool has been tested on Themida up to version 3.1.9. It's expected to work on WinLicense and Code Virtualizer as well. A Binary Ninja plugin is also available here. Features Automatically resolve trampolines' destination addresses Statically deobfuscate mutated functions Rebuild fully working binaries Known Limitations Doesn't support ARM64 binaries How To...
tfsec – Migrating To Trivy For Enhanced Infrastructure As Code Security
As part of our goal to provide a comprehensive open source security solution for all, we have been consolidating all of our scanning-related efforts in one place, and that is Trivy. Over the past year, tfsec has laid the foundations to Trivy's IaC & misconfigurations scanning capabilities, including Terraform scanning, which has been natively supported in Trivy for a long time...
CyberChef Server – A Comprehensive Guide To Setting Up And Using A CyberChef API
CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages other than JavaScript. By running this server, you can use CyberChef operations in any language, as long as you can communicate via HTTP. Example Use Assuming you've downloaded the repository and are running it locally: curl -X POST -H "Content-Type:application/json" -d '{"input":"......
Metasploit for Penetration Testing and Exploitation – 2024
Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit effectively. Key Features of Metasploit: Exploitation: Metasploit offers a large collection...