Finding security holes is a lot like finding hidden treasures in the world of bug bounty hunts. "Afuzz" turns out…
Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. "PassBreaker," a…
WinDiff is an open-source web-based tool that allows browsing and comparing symbol, type and syscall information of Microsoft Windows binaries…
.-. [.-''-., | //`~\) (<| 0\0|>_ ";\ _"/ \\_ _, __\|'._/_ \ '='-, /\ \ || )_///_\>> ( '._ T…
T3SF is a framework that offers a modular structure for the orchestration of events based on a master scenario events…
Basically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes…
C2 Search Netlas is a Java utility designed to detect Command and Control (C2) servers using the Netlas API. It…
Porch Pirate started as a tool to quickly uncover Postman secrets, and has slowly begun to evolve into a multi-purpose…
Tool to scrape LinkedIn This tool assists in performing reconnaissance using the LinkedIn.com website/API for red team or social engineering…
Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.…