cybersecurity

CVE Collector – A Python Tool For Managing CVE Data

Discover how to create a powerful CVE Collector using Python. This article provides guidance on collecting, managing, and staying updated…

1 year ago

Qu1ckdr0p2 – A Powerful Tool For Rapidly Hosting Payloads And Post-Exploitation Bins

In the world of cybersecurity and penetration testing, speed and efficiency can make all the difference. Enter Qu1ckdr0p2, a versatile…

1 year ago

TrafficWatch – A Comprehensive Guide To Network Traffic Analysis With Packet Sniffing

TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files. It provides insights into…

1 year ago

USB flows In The Great River – IDA FLIRT Signature And IOC

IDA Pro FLIRT signature for FlowCloud RAT component, "fcClientDll and Indicators mentioned in my presentation "USB flows in the Great…

1 year ago

Social-Media-OSINT-Tools-Collection – A Powerful Toolkit

A collection of most useful tools for social media osint. Unlock the potential of Open-Source Intelligence (OSINT) with our curated…

1 year ago

EMBA v1.3.1 : Diff It – Unveiling The Firmware Diffing Mode And Latest Updates

What Happened Since The Last EMBA Release? There was the absolute great #Hackersummercamp with our talks at BSidesLV, ICS Village (DEF CON)…

1 year ago

Furl – Wayback Machine URL Mining For Bug Hunting

Furl is a tool for mining URLs from Wayback Machine for bug hunting/fuzzing/further probing. Furl is a powerful tool designed…

1 year ago

C2 Tracker – Tracking C2, Malware, and Botnets

Free to use IOC feed for various tools/malware. It started out for just C2 tools but has morphed into tracking…

1 year ago

CryptoTester – Cryptography Utility For Ransomware Analysis

A utility for playing with cryptography, geared towards ransomware analysis. CryptoTester is a powerful utility designed for in-depth cryptographic analysis,…

1 year ago

PatchaPalooza – Your Offline Resource For Microsoft Security Update Analysis

A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates. In the ever-evolving landscape of cybersecurity, staying…

1 year ago