cybersecurity

BChecks : Unlocking The Power Of Burp Suite Professional – A Comprehensive Guide

Burp Suite Professional BChecks developed both by PortSwigger and the community. In the realm of cybersecurity and web application testing,…

1 year ago

Offensive Lua – Unveiling Lua Scripts For Windows Security Exploration

Offensive Lua is a collection of offensive security scripts written in Lua with FFI. The scripts run with LuaJIT (v2.0.5)…

1 year ago

Awesome Cybersecurity Handbooks – A Comprehensive Guide And Resource Repository

A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are…

1 year ago

WolfPack – Scaling Red Team Redirectors

WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale. This tool enables security…

1 year ago

Cameradar – Your Comprehensive Guide To RTSP Stream Access And Security

In the age of digital surveillance and connectivity, access to RTSP (Real-Time Streaming Protocol) streams plays a pivotal role in…

1 year ago

Elitewolf – Critical Infrastructure Security Insights

This repository contains various ICS/SCADA/OT focused signatures and analytics. The end goal is to enable Critical Infrastructure Defenders, Intrusion Analysts,…

1 year ago

SubCat – A Fast And Efficient Subdomain Enumeration Tool

SubCat a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple…

1 year ago

LinikatzV2 – Unveiling UNIX Secrets in Active Directory Environments

LinikatzV2 is a bash script based on the Linikatz tool developed by time-machine (link). It allows post-exploitation tasks on UNIX…

1 year ago

Msprobe – On-Prem Microsoft Solutions Discovery For Security

Discovering and securing on-premises Microsoft solutions is paramount in today's cybersecurity landscape. In this article, we delve into 'msprobe,' a…

1 year ago

Aftermath – Swift-Powered Incident Response And Data Analysis

Aftermath is a Swift-based, open-source incident response framework. Aftermath can be leveraged by defenders in order to collect and subsequently…

1 year ago