Botnets like Mirai have proven that there is a need for more security in embedded and IoT devices. This list shall help…
DevSecOps is an extension of the DevOps movement that aims to bring security practices into the development lifecycle through developer-centric security tooling and…
This Python script is designed as a proof of concept (PoC) to demonstrate an unauthenticated command injection vulnerability in Kemp…
HiddenVM is an innovation in computing privacy. Imagine you're entering a country at the airport. The border agents seize your laptop…
The General Data Protection Regulation (GDPR) is a regulation on data protection and privacy for all individuals within the European…
FormThief is a project designed for spoofing Windows desktop login applications using WinForms and WPF. Below is an example run…
"RustRedOps" stands as a groundbreaking repository, pioneering the development of sophisticated Red Team tools and techniques, all crafted in the…
A cross-platform GUI for youtube-dl made in Electron and node.js. Open Video Downloader, also known as youtube-dl-gui, revolutionizes the way…
Kali Linux is a Debian-based Linux distribution that is designed for digital forensics, penetration testing, and ethical hacking. It comes…
Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to…