cybersecurity

EvilSlackbot: A Cutting-Edge Tool for Enhancing Slack Workspace Security through Red Team and Phishing Simulations

It's impossible to say enough about how important cybersecurity is in this digital age, where teamwork tools like Slack are…

10 months ago

IMDSPOOF: Enhancing Cloud Security with Deceptive AWS IMDS Endpoint Spoofing

IMDSPOOF is a cyber deception tool that spoofs an AWS IMDS service. One way that attackers are able to escalate…

10 months ago

Telerecon: The OSINT Framework for Deep Telegram Analysis

Telerecon is a comprehensive OSINT reconnaissance framework for researching, investigating, and scraping Telegram. For example: Input a target username, and…

10 months ago

Commix: The Command Injection Exploiter for Penetration Testing

It stands for "comm and injection exploiter." Commix is a state-of-the-art open-source tool made for penetration testers and other cybersecurity…

10 months ago

Instagram Location Search: Navigating and Scraping Proximal Points with Ease

Find out how powerful Instagram Location Search is. It's a flexible Python tool that makes it easier to find and…

10 months ago

Active Directory Canaries: Advanced Detection and Prevention of AD Enumeration

Active Directory Canaries is a detection primitive for Active Directory enumeration (or recon) techniques. It abuses the concept of DACL…

10 months ago

FACTION PenTesting Report Generation and Collaboration Engine

In the world of cybersecurity, where things change quickly, it's important to do thorough and fast penetration testing. Here comes…

10 months ago

XnLinkFinder v4.1 – A Comprehensive Guide To Discovering Endpoints And Parameters

This is a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:…

10 months ago

Osquery-Defense-Kit : Enhancing Cybersecurity

Osquery queries for Detection & Incident Response, containing 250+ production-ready queries. ODK (osquery-defense-kit) is unique in that the queries are…

10 months ago

Coerced Potato Reflective DLL – Unveiling Privilege Escalation From NT Service To SYSTEM

Privilege escalation from NT Service to SYSTEM using SeImpersonateToken privilege and MS-RPRN functions. Heavily based Reflective Loader from Install Clone…

10 months ago