Wednesday, July 28, 2021
Home Tags Token Breaker

Tag: Token Breaker

Must Need

VHosts-Sieve : Searching For Virtual Hosts Among Non-Resolvable Domains

VHosts-Sieve : Searching For Virtual Hosts Among Non-Resolvable Domains

VHosts-Sieve is a searching for virtual hosts among non-resolvable domains. Installation git clone https://github.com/dariusztytko/vhosts-sieve.git...
FIR

FIR : Fast Incident Response

FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy...
Flerken : Obfuscated Command Detection Tool

Flerken : Obfuscated Command Detection Tool

Flerken is an Open-source obfuscated command detection tool. Command line obfuscation has been proved to be a non-negligible factor in file-less malware...
Endpoint Detection and Response: 6 Best Practices You Must Know About

Endpoint Detection and Response: 6 Best Practices You Must Know About

What Is Endpoint Detection and Response? An endpoint detection and response (EDR) solution is a collection of tools and...
NebulousAD : Automated Credential Auditing Tool

NebulousAD : Automated Credential Auditing Tool

NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a...
Java-Stager

Java-Stager : A PoC To Download, Compile & Execute A Java...

A PoC Java-Stager which can download, compile, and execute a Java file in memory. The key parts of the talk for me are: Load a...
IoT Home Guard

IoT Home Guard : A Tool for Malicious Behavior Detection in...

IoT Home Guard is a project to help people discover malware in smart home devices. For users the project...