Monday, September 16, 2019
Home Tags Intel Techniques

Tag: Intel Techniques

Must Need

Nameles

Nameles – Open Source Entropy Based Invalid Traffic Detection & Pre-bid...

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad...
Androl4b

Androl4b – Android Security Virtual Machine

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security...
Ridrelay

RidRelay – Easy Way To Get Domain Usernames While On An...

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common lsarpc based queries and...
Fake Sandbox : Script To Simulate Fake Processes Of Analysis Sandbox/VM

Fake Sandbox : Script To Simulate Fake Processes Of Analysis Sandbox/VM

Fake Sandbox Processes small script will simulate fake processes of analysis, sandbox and VM software that some malware will try to...
ReelPhish

ReelPhish – A Real-Time Two-Factor Phishing Tool

ReelPhish is a real-time two-factor phishing tool. This ReelPhish tool has been released along with a FireEye blog post. The blog post can be...
CRS

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application...
Truegaze : Static Analysis Tool For Android/iOS Applications Focusing On Security Issues Outside The Source Code

Truegaze : Static Analysis Tool For Android/iOS Applications Focusing On Security...

Truegaze is a static analysis tool for Android and iOS applications focusing on security issues outside the source code such as resource...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout