informationsecurity

Wireshark 4.0.10 Released – What’s New!

The most widely used network protocol analyzer worldwide is Wireshark. It is employed in network troubleshooting, security analysis, software protocol…

1 year ago

ELFEN – Linux Malware Analysis Sandbox

ELFEN is a dockerized sandbox for analyzing Linux (file type: ELF) malware. It leverages an array of open-source technologies to perform…

1 year ago

Incident Response Playbooks – Streamlined Security Mitigation Guides

Welcome to the Incident Response Playbooks repository! We're creating these playbooks with the knowledge gained from LetsDefend to assist security experts in…

1 year ago

HyperDbg v0.6-beta: Advanced Debugging & Memory Upgrades

If you’re enjoying HyperDbg, don’t forget to give a star on GitHub! Please visit Build & Install to configure the environment for…

1 year ago

Awesome Command And Control

A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd…

1 year ago

GDBleed – Advanced Binary Instrumentation with GDB

GDBleed - Dynamic-Static binary instrumentation framework on top of GDB GDBleed is a gdb wrapper exposing a set of commands for…

1 year ago

RedPersist – Advanced Windows Persistence in C#

In the evolving landscape of system management, maintaining application persistence is paramount. 'RedPersist' stands out as a robust solution, offering…

1 year ago

Eyes: Email-Centric OSINT Uncovered

Eyes is an OSINT tool that focuses on extracting information related to an email address. Whether you’re a cybersecurity professional,…

1 year ago

Villain – Elevating C2 OperationsVillain

A groundbreaking C2 framework designed for modern cybersecurity challenges. With its advanced TCP & HoaxShell capabilities, Villain is set to…

1 year ago

Cloud Katana – Serverless Security for Multi-Cloud

The cutting-edge toolset designed for the modern cloud landscape. Born from a dire need to streamline security evaluations in multi-cloud…

1 year ago