informationsecurity

Dependency-Track 4.11.5 : Updates And Changes

For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.If additional details are required, consult…

2 months ago

OWASP Noir – A Comprehensive Guide To Advanced Source Code Analysis And Security Testing

The cutting-edge tool designed to enhance security testing through deep source code analysis. OWASP Noir supports multiple programming languages and…

2 months ago

WAF Bypass Tool – A Comprehensive Guide To Enhancing Web Application Security

WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False…

2 months ago

Shwmae – Exploiting Windows Hello Security Protocols

Shwmae (shuh-my) is a Windows Hello abuse tool that was released during DEF CON 32 as part of the Abusing…

2 months ago

PentestGPT – A Comprehensive Guide To Local And Hosted Deployment

PentestGPT provides advanced AI and integrated tools to help security teams conduct comprehensive penetration tests effortlessly. Scan, exploit, and analyze…

2 months ago

ScubaGear – Ensuring Microsoft 365 Security Compliance

ScubaGear is an assessment tool that verifies that a Microsoft 365 (M365) tenant’s configuration conforms to the policies described in…

2 months ago

GhostStrike – The Shadows Of Advanced Cybersecurity Operations

GhostStrike is an advanced cybersecurity tool designed for Red Team operations, featuring sophisticated techniques to evade detection and perform process hollowing…

2 months ago

Leveraging eBPF For Advanced Kubernetes Monitoring

eBPF, or Extended Berkeley Packet Filter, is a technology that lets programs run in the Linux kernel. It was first…

2 months ago

ECS Logs Collector – Essential Tool For Amazon ECS Troubleshooting

This project was created to collect Amazon ECS log files and Operating System log files for troubleshooting Amazon ECS customer support cases.…

2 months ago

GOAD – A Comprehensive Guide To The Ultimate Active Directory Pentest Lab

GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active…

2 months ago