informationsecurity

Thief Raccoon – A Comprehensive Guide To Simulating Phishing Attacks For Cybersecurity Education

Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating…

3 months ago

TotalRecall – Harnessing And Questioning Windows Recall’s Data Extraction

This very simple tool extracts and displays data from the Recall feature in Windows 11, providing an easy way to…

3 months ago

Surfactant – Streamlining SBOM Generation And Dependency Analysis

Surfactant can be used to gather information from a set of files to generate an SBOM, along with manipulating SBOMs…

4 months ago

LogSnare – Mastering IDOR And Access Control Vulnerabilities Through Hands-On Learnin

LogSnare is an intentionally vulnerable web application, where your goal is to go from a basic gopher user of the LogSnare company,…

4 months ago

GearGoat – A Comprehensive Guide To Using CaringCaribou For CAN Network Analysis

To find out the arbitration IDs and the corresponding message data and positional bytes for all the actions in GearGoat…

4 months ago

FireFox OSINT And Security Researcher Configuration – A Guide To Enhancing Firefox For Security Investigations

Configure FireFox with Security and Intelligance features for OSINT and Security Investigations. This repo is in early alpha. Do not…

4 months ago

ForensiX – Advanced Digital Forensics For Chrome Data Analysis

Explore the cutting-edge capabilities of ForensiX, a robust digital forensics tool designed for deep analysis of Google Chrome data. From…

4 months ago

Toutatis – The Ultimate Tool For Extracting Data From Instagram Profiles

Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and moreFor…

4 months ago

libelfmaster – Pioneering Secure And Versatile ELF Parsing

libelfmaster is a C library for loading and parsing ELF objects of any type. The goal of this project was…

4 months ago

Karma v2 – The Ultimate Tool For Enhanced Cybersecurity Research

???????????????????? ???????? can be used by Infosec Researchers, Penetration Testers, Bug Hunters to find deep information, more assets, WAF/CDN bypassed…

4 months ago