Sunday, December 15, 2019
Home Tags Location

Tag: Location

Must Need

Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial & Customized Assessment

Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial...

Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup - no...
Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services

Cloud Security Audit : A Command Line Security Audit Tool For...

Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be...
TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the...
Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics &...

Tylium is a primary data pipelines for intrusion detection, security analytics and threat hunting. These files contain configuration for producing EDR...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have to do more. It involves...
Legion

Legion : An Open Source, Easy-To-Use, Super-extensible & Semi-Automated Network Penetration...

Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids...
RedGhost : Linux Post Exploitation Framework

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.