cybersecurity

Quick Setup Guide for Amnesiac – Running Directly From Memory

Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run,…

10 months ago

Okta Terrify – Exposing Vulnerabilities In Passwordless Authentication

This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The…

10 months ago

Cyber Detective’s OSINT Tools Collection

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…

10 months ago

SocialPath – A Comprehensive Tool For Social Media Analysis And Darknet User Tracking

SocialPath emerges as a cutting-edge tool designed for security researchers and digital forensics experts. It enables the tracking and analysis…

10 months ago

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…

10 months ago

Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…

10 months ago

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…

10 months ago

Pacu – A Comprehensive Guide To The AWS Exploitation Framework

Pacu is an open source AWS exploitation framework created and maintained by Rhino Security Labs to assist in offensive security…

11 months ago

Voidgate – Advanced Technique To Bypass AV/EDR Memory Scanners

A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes…

11 months ago

sttr – A Command Line Tool For String Transformations

sttr is command line software that allows you to quickly run various transformation operations on the string. // With input prompt…

11 months ago