Thursday, October 22, 2020
Home Tags Emulation

Tag: Emulation

Must Need

Top 3 Open-Source Software Security Concerns and How to Mitigate Them

Top 3 Open-Source Software Security Concerns and How to Mitigate Them

The term open-source refers to code that is made publicly available for scrutiny, modification, and distribution. It is typically made by volunteer...
Concrete5 CMS

Vulnerability Scanner And Information Gatherer For The Concrete5 CMS – C5Scan

Vulnerability scanner and data gatherer for the Concrete5 CMS or C5Scan. Is somewhat outdated by and by pending a refactor. Concrete5 is an open-source content...
TimeWarrior : Commandline Time Reporting

TimeWarrior : Commandline Time Reporting

Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible reporting. It...
SharpSecDump : .Net Port Of The Remote SAM + LSA Secrets Dumping

SharpSecDump : .Net Port Of The Remote SAM + LSA Secrets...

SharpSecDump is a .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py. By default runs in the...
TakeOver : Sub-Domain TakeOver Vulnerability Scanner

TakeOver : Sub-Domain TakeOver Vulnerability Scanner

Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed...
NullScan : A Modular Framework Designed To Chain & Automate Security Tests

NullScan : A Modular Framework Designed To Chain & Automate Security...

NullScan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs...
Kirjuri : Web Application For Managing Cases & Physical Forensic Evidence Items

Kirjuri : Web Application For Managing Cases & Physical Forensic Evidence...

Kirjuri is a simple php/mysql web application for managing physical forensic evidence items. It is intended to be used as a workflow...