SOAR Tools: What to Look for When Investing in Security Automation Tech
Security orchestration and automation (SOAR) refers to a collection of software solutions and tools that organizations can leverage to streamline...
Security orchestration and automation (SOAR) refers to a collection of software solutions and tools that organizations can leverage to streamline...
All in one tools for CRYPTOLOGY. Instagram: Capture the RootScreenshotsHow to use FeaturesThis tool include: HASH RSA XOR AES (ECC)...
ATTPwn is a computer security tool designed to emulate adversaries. The tool aims to bring emulation of a real threat...
The second Patch Tuesday of 2021 is relatively light on the vulnerability count, with 64 CVEs being addressed across the...
Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily...
Ditto is a small tool that accepts a domain name as input and generates all its variants for an homograph...
Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code Especially malware reversers will find this useful,...
This project is currently not maintained. I haven't put any work on it since 2016 and with the current state...
ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by;...
Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues...
Cloudlist is a multi-cloud tool for getting Assets (Hostnames, IP Addresses) from Cloud Providers. This is intended to be used...
Using Go to implement CobaltStrike's Beacon This project is for learning protocol analysis and reverse engineering only, if someone's rights...
Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This...
phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process...
The “sudo” advisory is officially presented as “Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021” and affects pretty much...
Not content with the beating it laid down in January, 2021 continues to deliver with an unpatched zero-day exposure in...
InsightVM and Nexpose customers can now harness the power of the Metasploit community to assess their exposure to the latest...
"linux-chrome-recon" is a Information gathering tool used to enumerate all possible data about an user from Google-Chrome browser from any...
Open Cloud Security Posture Management, OpenCSPM, is an open-source platform for gaining deeper insight into your cloud configuration and metadata...
Uroboros is a GNU/Linux monitoring tool focused on single processes. While utilities like top, ps and htop provide great overall...
Burp Suite extension for extracting metadata from files Currently supported documents: PDF DOCX PPTX XLSX The project created at Jetbrains...
This is "flawfinder" by David A. Wheeler. Flawfinder is a simple program that scans C/C++ source code and reports potential...
Fast Modular Web Interfaces BruteforcerInstallpython3 -m pip install -r requirements.txt Usage$ python3 web-brutator.py -h __ __ ___. __________ __ __...
Cyber-espionage and exploitation from nation-state-sanctioned actors have only become more prevalent in recent years, with recent examples including the SolarWinds...