Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…
Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…
Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…
This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…
In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and…
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…
Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum,…
Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run,…
This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The…
Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…