Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…
Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…
Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…
A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…
sttr is command line software that allows you to quickly run various transformation operations on the string. // With input prompt…
CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These…
During pentest, an important aspect is to be stealth. For this reason you should clear your tracks after your passage. Nevertheless, many…
OSINT-Collector is an advanced framework that facilitates the collection, analysis, and management of OSINT information useful for conducting investigations in specific domains of interest. Table Of Contents…
GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal on *nix systems or through your browser. It…