cybersecurity

Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation

Amnesiac is a post-exploitation framework designed to assist with lateral movement within active directory environments. Amnesiac is being developed to bridge…

12 months ago

Mantis: The Comprehensive Command-Line Framework for Asset Discovery and Security Scanning

Mantis is a command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning. It takes the top-level…

12 months ago

llamafile: Streamlining Access to Large Language Models with Single-File Executables for Local Deployment

llamafile lets you distribute and run LLMs with a single file. (announcement blog post) Our goal is to make open…

12 months ago

Free Threat Intel/IOC Feeds: Maximizing Cybersecurity Efficacy with Open-Source Intelligence Integration

This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. The CSV ThreatIntelFeeds is stored…

12 months ago

Hayabusa: Revolutionizing Windows Event Log Analysis with Rapid Forensics and Advanced Threat Hunting Capabilities

Hayabusa is a Windows event log fast forensics timeline generator and threat hunting tool created by the Yamato Security group in Japan. Hayabusa means "peregrine falcon" in Japanese…

12 months ago

EvilSlackbot: A Cutting-Edge Tool for Enhancing Slack Workspace Security through Red Team and Phishing Simulations

It's impossible to say enough about how important cybersecurity is in this digital age, where teamwork tools like Slack are…

12 months ago

IMDSPOOF: Enhancing Cloud Security with Deceptive AWS IMDS Endpoint Spoofing

IMDSPOOF is a cyber deception tool that spoofs an AWS IMDS service. One way that attackers are able to escalate…

12 months ago

Telerecon: The OSINT Framework for Deep Telegram Analysis

Telerecon is a comprehensive OSINT reconnaissance framework for researching, investigating, and scraping Telegram. For example: Input a target username, and…

12 months ago

Commix: The Command Injection Exploiter for Penetration Testing

It stands for "comm and injection exploiter." Commix is a state-of-the-art open-source tool made for penetration testers and other cybersecurity…

12 months ago

Instagram Location Search: Navigating and Scraping Proximal Points with Ease

Find out how powerful Instagram Location Search is. It's a flexible Python tool that makes it easier to find and…

12 months ago