Thursday, July 2, 2020
Home Tags SHA512

Tag: SHA512

Must Need

Sojobo : A Binary Analysis Framework

Sojobo : A Binary Analysis Framework

Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It...
Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia : AWS Identity & Access Management Visualizer & Anomaly Finder

Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j. This...
RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams

RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace.
Archery

Archery – Open Source Vulnerability Assessment & Management Helps Developers &...

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. It uses popular opensource...
Terraform AWS Secure Baseline :  To Set Up Your AWS Account

Terraform AWS Secure Baseline : To Set Up Your AWS...

Terraform Aws Secure Baseline is a terraform module to set up your AWS account with the secure baseline configuration based on CIS...
Door404

Door404 – Door404 is Open Source Project

Door404 is Open Source Project Developed For 2 Reasons, Help Beginners to learn coding . Help Newbie Servers Managers To Learn New Protection Tricks. It...
MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This...