Tuesday, December 10, 2019
Home Tags Hci

Tag: hci

bluelog

Bluelog

Must Need

Memguard : Secure Software Enclave For Storage Of Sensitive Information In Memory

Memguard : Secure Software Enclave For Storage Of Sensitive Information In...

MemGuard secure software enclave for storage of sensitive information in memory. This package attempts to reduce the likelihood of sensitive data being...
Flightsim

Flightsim : Utility to Generate Malicious Network Traffic & Evaluate Controls

Flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.
WSSAT

WSSAT – Web Service Security Assessment Tool

WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing...
SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’ Misconfigurations & Vulnerabilities Within Sudo

SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’...

SUDO KILLER is a tool which help to abuse SUDO in different ways and with the main objective of performing a privilege...
Hindsight

Hindsight – Tool For Analyzing Web Artifacts Chrome Browser & Chromium-Based...

Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded...
B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis

B2R2 : A Collection of Algorithms, Functions And Tools For Binary...

B2R2 is a collection of useful algorithms, functions, and tools for binary analysis written purely in F# (in .NET lingo, it is...
Netstat2Neo4J : Netstat Visualization With Neo4j

Netstat2Neo4J : Netstat Visualization With Neo4j

Netstat2Neo4J tool that create cypher create statements for neo4j out of netstat files from multiple machines. Graphs help...