informationsecurity

Hayabusa: Revolutionizing Windows Event Log Analysis with Rapid Forensics and Advanced Threat Hunting Capabilities

Hayabusa is a Windows event log fast forensics timeline generator and threat hunting tool created by the Yamato Security group in Japan. Hayabusa means "peregrine falcon" in Japanese…

1 year ago

EvilSlackbot: A Cutting-Edge Tool for Enhancing Slack Workspace Security through Red Team and Phishing Simulations

It's impossible to say enough about how important cybersecurity is in this digital age, where teamwork tools like Slack are…

1 year ago

IMDSPOOF: Enhancing Cloud Security with Deceptive AWS IMDS Endpoint Spoofing

IMDSPOOF is a cyber deception tool that spoofs an AWS IMDS service. One way that attackers are able to escalate…

1 year ago

Telerecon: The OSINT Framework for Deep Telegram Analysis

Telerecon is a comprehensive OSINT reconnaissance framework for researching, investigating, and scraping Telegram. For example: Input a target username, and…

1 year ago

Commix: The Command Injection Exploiter for Penetration Testing

It stands for "comm and injection exploiter." Commix is a state-of-the-art open-source tool made for penetration testers and other cybersecurity…

1 year ago

Instagram Location Search: Navigating and Scraping Proximal Points with Ease

Find out how powerful Instagram Location Search is. It's a flexible Python tool that makes it easier to find and…

1 year ago

Active Directory Canaries: Advanced Detection and Prevention of AD Enumeration

Active Directory Canaries is a detection primitive for Active Directory enumeration (or recon) techniques. It abuses the concept of DACL…

1 year ago

FACTION PenTesting Report Generation and Collaboration Engine

In the world of cybersecurity, where things change quickly, it's important to do thorough and fast penetration testing. Here comes…

1 year ago

XnLinkFinder v4.1 – A Comprehensive Guide To Discovering Endpoints And Parameters

This is a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:…

1 year ago

Osquery-Defense-Kit : Enhancing Cybersecurity

Osquery queries for Detection & Incident Response, containing 250+ production-ready queries. ODK (osquery-defense-kit) is unique in that the queries are…

1 year ago