This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the…
This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations…
An innovative SSH honeypot equipped with the XZ backdoor, identified by CVE-2024-3094. Designed to bait and study potential attackers, this…
This KQL query can be used to detect post exploitation activities related to CVE-2024-3094. This vulnerability is related to reports…
This project introduces an universal tool for ESP32 platform for implementing various Wi-Fi attacks. It provides some common functionality that…
ChaiLdr - AV Evasive Payload Loader represents a cutting-edge approach in malware development, blending innovative evasion techniques to bypass modern…
In an age where digital privacy and security are paramount, IpHack emerges as a powerful tool designed to revolutionize the…
Tracecat is currently in public alpha. If you'd like to use Tracecat in production, please reach out to us on…
Powershell Digital Forensics & Incident Response (DFIR) equips cybersecurity professionals with a suite of PowerShell scripts tailored for effective incident…
CspReconGo is a command-line tool designed for cybersecurity analysts, web developers, and IT professionals. It automates the extraction and analysis…