cybersecurity

AD_Enumeration_Hunt – AD Pentesting Toolkit

Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be…

1 year ago

Wireshark 4.0.8 Release: What’s New!

Wireshark released the latest release note for 4.0.8 on its official page regarding bug fixes that have been detected earlier…

1 year ago

Vajra – Your Weapon To Cloud

About Vajra Vajra is a tool with a graphical user interface that can be used to attack and look around…

1 year ago

How to Use Ettercap to Intercept and Sniff Passwords

For man-in-the-middle attacks, Ettercap is a complete suite. It includes live connection sniffing, real-time content filtering, and other intriguing techniques.…

2 years ago

RedditC2 : Abusing Reddit API To Host The C2 Traffic

RedditC2 is an abusing Reddit API To Host The C2 Traffic, Since Most Of The Blue-Team Members Use Reddit, It…

2 years ago

Subfinder – A New Tool to Discover Subdomains for Websites

Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains…

2 years ago

Watcher : Open Source Cybersecurity Threat Hunting Platform

Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organization. It should…

4 years ago

W12Scan : A Simple Asset Discovery Engine for Cybersecurity

W12Scan is a network asset discovery engine that can automatically aggregates related assets for analysis and use. W12scan is also…

6 years ago

FIR : Fast Incident Response

FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for…

6 years ago