Tuesday, June 15, 2021
Home Tags Killshot

Tag: Killshot

Must Need

Spacesiren : A Honey Token Manager & Alert System For AWS

Spacesiren : A Honey Token Manager & Alert System For AWS

SpaceSiren is a honey token manager and alert system for AWS. With this fully serverless application, you can create and manage honey...
Hack Windows Installer

Hack Windows Installer For The Hack Typeface

Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts,...
Vba2Graph

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis...

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph, with potential malicious keywords...
GitGot – Semi-Automated, Feedback-Driven Tool To Rapidly Search Through Troves Of Public Data On GitHub For Sensitive Secrets

GitGot – Semi-Automated, Feedback-Driven Tool To Rapidly Search Through Troves Of...

GitGot is a semi-automated, feedback-driven tool to empower users to rapidly search through troves of public data on GitHub for sensitive secrets....
DumpTheGit : Public Repositories to Find Sensitive Information Uploaded to the Github Repositories

DumpTheGit : Public Repositories to Find Sensitive Information Uploaded to the...

DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories. The tool will flag the...
Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.
Amass : In-Depth DNS Enumeration and Network Mapping

Amass : In-Depth DNS Enumeration and Network Mapping

The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names and reverse...