Monday, October 21, 2019
Home Tags Layer 2

Tag: layer 2

Must Need

SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of...
LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

LANGhost is designed for Raspberry Pis (Raspbian/Kali for RPi). Running it on other/desktop distros could cause issues and may not work as...
CTF

CTF – Some Setup Scripts For Security Research Tools

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...

Hardening up Your Cyber Defence With Risk Assessment

Your company faces an array of cyber threats, which are both internal and external. Cybersecurity risk assessment is meant to identify, assess, and implement security...
SIPI

SIPI – Simple IP Information Tools for Reputation Data Analysis

SIPI tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do...
W12Scan

W12Scan : A Simple Asset Discovery Engine for Cybersecurity

W12Scan is a network asset discovery engine that can automatically aggregates related assets for analysis and use. W12scan is also my...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...