Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane...
WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application...
ThreatHunt is a simple PowerShell repository that allows you to train your threat hunting skills. ThreatHunt allows you to simulate a variety...
ReconPi – A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.Start using that Raspberry Pi...
CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti...
Dsiem Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system. Dsiem...
Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the...
A young man from Hull, United Kingdom was sentenced to 3 years in prison for selling ecstasy and ketamine sourced from the...
pylane Pylane is a python vm injector with debug tools, based on gdb and ptrace. It uses gdb to trace python process,...
functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based...
Real Time Threat Monitoring Tool V2.0 Monitoring possible threats of your company on the Internet is an impossible task to be achieved...
Red Hat and CentOS have announced the availability of important kernel security updates for their Red Hat Enterprise Linux 7 and CentOS...
A CLI application that automatically prepares Android APK files for HTTPS inspection Inspecting a mobile app’s HTTPS traffic using a proxy is...
Two were sentenced prison for running a “major darkweb dug operation” out of their Liverpool home. According to evidence revealed in court,...
RansomCoin Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run...
Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the...
With each passing year, cybersecurity concerns increase in terms of the number of threats and their severity. Hackers can and will cause...
Antbot.pw provides a free, open API endpoint for checking a domain or email address against a frequently-updated list of disposable domains. CORS...
Law enforcement in the Czech Republic arrested five individuals for running an international drug trafficking ring out of Brno. The group allegedly...
RetDec is a retargetable machine-code decompiler based on LLVM.The decompiler is not limited to any particular target architecture, operating system, or executable...
Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests...