informationsecurity

Configuration in Tartufo – A Comprehensive Guide To Customizing Security Scans

tartufo has a wide variety of options to customize its operation available on the command line. Some of these options, however, can…

1 month ago

Sippts – The Comprehensive Guide To Auditing VoIP Security via SIP Protocol

Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sippts is programmed in Python…

1 month ago

Version 3.7 – Comprehensive Enhancements And New Features In SQL Server Chain Execution Tool

Complete refactor of code base. Updated documentation (code comments, README, and wiki) Execution against a linked SQL server chain. For…

1 month ago

Features Of Turtufo – Comprehensive Guide To Scanning For Secrets In Code Repositories

While tartufo started its life with one primary mode of operation, scanning the history of a git repository, it has grown other…

1 month ago

Office 365 Extractor – A Complete Guide To Extracting Audit Logs And Enhancing Forensic Investigations

This script makes it possible to extract log data out of an Office365 environment. The script created by us consist…

1 month ago

Snaffler Output File Parser – Enhancing Data Analysis With Advanced Features

Especially in large environments, the Snaffler output gets very large and time-consuming to analyze. This script parse the Snaffler output…

1 month ago

Open-Source Web Scanners : A Detailed List Of Tools From GitHub And GitLab

A list of open source web security scanners on GitHub and GitLab, ordered by Stars. It does not provide in-depth…

1 month ago

Sysdig Inspect – A Comprehensive Guide To Container Troubleshooting And Securit

Sysdig Inspect is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate…

1 month ago

Checking The Installation – A Guide To Installing And Verifying Tartuf

You can install tartufo in the usual ways you would for a Python Package, or using docker to pull the latest tartufo docker image from Docker…

1 month ago

CVE-2024-38077-EXP : In-Depth Analysis And Exploitation Of A Windows Server 2025 Vulnerability

We delve into CVE-2024-38077, a critical security vulnerability identified in Windows Server 2025. This flaw, if exploited, could allow unauthorized…

1 month ago