security

Astra : Automated Security Testing For REST API’s

REST API penetration testing is complex due to continuous changes in existing APIs and newly added APIs. Astra can be…

4 years ago

MultiJuicer : Run Capture Flags & Security Trainings With OWASP Juice Shop

MultiJuicer is a tool used to run capture the flags and security trainings with OWASP juice shop . Running CTFs…

4 years ago

0l4bs : Cross-Site Scripting Labs For Web Application Security Enthusiasts

Ol4bs is a cross-site scripting labs for web application security enthusiasts. List of Chall ~ Chall 1 | URL ~…

4 years ago

How to Protect Yourself Against Common Password Attacks

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the…

4 years ago

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions. This…

4 years ago

HuskyCI : Performing Security Tests Inside Your CI

HuskyCI is an open source tool that orchestrates security tests and centralizes all results into a database for further analysis…

4 years ago

Haaukins : A Highly Accessible & Automated Virtualization Platform for Security Education

Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and…

4 years ago

JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites

A ready to use JSONP endpoints to help bypass content security policy of different websites. The tool was presented during…

5 years ago

DumpsterFire : Toolset – Security Incidents In A Box!

The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily create custom event…

5 years ago

PingCastle : Get Active Directory Security At 80% In 20% Of The Time

PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment…

5 years ago