cybersecurity

Audio-Metadata : Simplifying Audio File Analysis With A Lightweight JavaScript Library

The purpose of this library is to be very fast and small. It's suitable for server-side or client-side. Really any…

7 months ago

PDFMtEd – Simplifying PDF Metadata Management On Linux

PDFMtEd (PDF Metadata Editor) is a set of tools designed to simplify working with PDF metadata on Linux. The utilities hosted in this…

7 months ago

Crime Data Explorer : An In-Depth Look At FBI’s Open Crime Data Initiative

The FBI collects and publishes Uniform Crime Reporting (UCR) data on an annual basis. Over 18,000 law enforcement agencies across the country…

7 months ago

XMGoat – Mastering Azure Security Through Hands-On Attack Scenario

XM Goat is composed of XM Cyber terraform templates that help you learn about common Azure security issues. Each template…

7 months ago

VulnNodeApp – Exploring Web Vulnerabilities With A Node.js Educational Tool

A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.…

7 months ago

Hfinger – Fingerprinting Malware HTTP Requests

Tool for fingerprinting HTTP requests of malware. Based on Tshark and written in Python3. Working prototype stage. Its main objective…

7 months ago

CloudBrute – Unleashing Automated Security Testing Across Multiple Cloud Platforms

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,…

7 months ago

Ashok – The Ultimate Reconnaissance Toolkit For Penetration Testers

Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is…

7 months ago

IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes

Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…

7 months ago

SharpGraphView – A Modular Toolkit For Advanced Azure Cloud Attacks

Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…

7 months ago