cybersecurity

FalconHound – Empowering Blue Teams With Automated BloodHound Integration

FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more…

8 months ago

Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages…

8 months ago

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can…

8 months ago

DllNotificationInjection – Exploring A Novel Threadless Process Injection Technique

DllNotificationInection is a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification…

8 months ago

httpAlive – URL Analysis Tool For Web Application Penetration Test

Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent rotation, multithreading, and…

8 months ago

DDoS Scripts – Supercharging Your Kali Linux With Hacking Tools

Explore the world of DDoS scripts and hacking tools to enhance your Kali Linux experience. In this comprehensive guide, we…

8 months ago

katoolin – Streamline Your Kali Linux Tool Installation With This Comprehensive Guide

katoolin is a powerful tool that simplifies the installation of Kali Linux tools on compatible systems. With the ability to…

8 months ago

PwnDoc – Streamlining Pentest Reporting For Efficient Vulnerability Management

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx…

8 months ago

Bypass Fuzzer – Exploring A Powerful Tool For Testing End Point Security

This tool performs various checks via headers, path normalization, verbs, etc. to attempt to bypass ACL's or URL validation. It…

8 months ago

SSH3 – Faster And Rich Secure Shell Using HTTP/3

SSH3 is a complete revisit of the SSH protocol, mapping its semantics on top of the HTTP mechanisms. In a…

8 months ago