cybersecurity

CloudBrute – Unleashing Automated Security Testing Across Multiple Cloud Platforms

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,…

10 months ago

Ashok – The Ultimate Reconnaissance Toolkit For Penetration Testers

Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is…

10 months ago

IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes

Firstly, a folder is created in the temp directory, and the properties of the folder are opened using SHObjectProperties. To…

10 months ago

SharpGraphView – A Modular Toolkit For Advanced Azure Cloud Attacks

Sharp post-exploitation toolkit providing modular access to the Microsoft Graph API (graph.microsoft.com) for cloud and red team operations. Created during…

10 months ago

Gungnir : Monitoring Certificate Transparency In Real-Time

Gungnir is a command-line tool written in Go that continuously monitors certificate transparency (CT) logs for newly issued SSL/TLS certificates.…

10 months ago

Binary Exploitation Notes – Techniques, Resources, And More

Dive into the world of binary exploitation with this comprehensive guide. Whether you're a beginner eager to understand stack techniques…

10 months ago

Awesome-Mobile-CTF : The Ultimate Guide To Mobile Capture The Flag Challenges And Resources

This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based…

10 months ago

ArreStats – The Ultimate Tool For Exploring New Jersey’s Arrest Records

In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and…

10 months ago

teler : Version 3 With Enhanced Capabilities And Community-Driven Development

teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…

10 months ago

Invoke-ADEnum : Comprehensive Guide To Active Directory Enumeratio

Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum,…

10 months ago