informationsecurity

ArreStats – The Ultimate Tool For Exploring New Jersey’s Arrest Records

In the ever-evolving landscape of data journalism, tools that allow for the exploration of public records in an intuitive and…

5 months ago

teler : Version 3 With Enhanced Capabilities And Community-Driven Development

teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide…

5 months ago

Invoke-ADEnum : Comprehensive Guide To Active Directory Enumeratio

Invoke-ADEnum is an enumeration tool designed to automate the process of gathering information from an Active Directory environment. With Invoke-ADEnum,…

5 months ago

Quick Setup Guide for Amnesiac – Running Directly From Memory

Amnesiac does not require installation on the target system. To get started, simply load the tool in memory and run,…

5 months ago

Okta Terrify – Exposing Vulnerabilities In Passwordless Authentication

This tools was released as part of my BSides Cymru 2024 talk, Okta Terrify: Persistence in a Passwordless World. The…

5 months ago

Cyber Detective’s OSINT Tools Collection

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the…

5 months ago

SocialPath – A Comprehensive Tool For Social Media Analysis And Darknet User Tracking

SocialPath emerges as a cutting-edge tool designed for security researchers and digital forensics experts. It enables the tracking and analysis…

5 months ago

Kamerka GUI – Advanced Reconnaissance For IoT And ICS

Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS). Developed…

5 months ago

Gitleaks – Comprehensive Guide To Detecting Hardcoded Secrets In Git Repositories

Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one…

5 months ago

Abuse INSIGHTS – Harnessing Python To Decode Brute Force Usernames From Compromised Hosts

Abuse INSIGHTS is a python script created to extract the usernames brute forced by a compromised host. This data is extracted…

5 months ago