Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.
Hacking
Exfilkit - Data Exfiltration Utility For Testing Detection...
Data exfiltration utility for testing detection capabilities Description Data exfiltration...
DOMDig - DOM XSS Scanner For Single Page Applications
DOMDig is a DOM XSS scanner that runs inside the Chromium web browser and it can...
confluencePot - Simple Honeypot For Atlassian Confluence...
ConfluencePot is a simple honeypot for the Atlassian Confluence unauthenticated...
SharpEventPersist - Persistence By Writing/Reading Shellcode...
Persistence by writing/reading shellcode from Event Log. Usage The SharpEventPersist...
Goreplay - Open-Source Tool For Capturing And Replaying...
GoReplay is an open-source network monitoring tool which can record your live traffic...
Gshell - A Flexible And Scalable Cross-Plaform Shell Generator...
A simple yet flexible cross-platform shell generator tool. Name: G(Great) Shell...
Ethical Hackers Help Beiersdorf Minimize Risk and Protect...
After a year of running a private Vulnerability Disclosure Program (VDP), Beiersdorf...
How Critical Infrastructure Can be Protected from Threats
Accessing a major critical infrastructure network is very appealing to cybercriminals,...
How to Catch Injection Security Vulnerabilities in Code...
Injection vulnerabilities result from insecure handling of user inputs. They are...
CISOs: Do You Know the Security Risks of Your Organization's...
An ever-expanding attack surface is a global concern for most organizations and...
FindFunc - Advanced Filtering/Finding of Functions in IDA...
FindFunc is an IDA Pro plugin to find code functions that contain a certain assembly...
Pocsploit - A Lightweight, Flexible And Novel Open Source...
pocsploit is a lightweight, flexible and novel open source poc verification framework...
Ransomware-Simulator - Ransomware Simulator Written In...
The goal of this repository is to provide a simple, harmless way to check your AV's...
LEAF - Linux Evidence Acquisition Framework
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from...
Stunner - Tool To Test And Exploit STUN, TURN And TURN...
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers. TURN...