Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null terminated) registry key. This...
CodeCat is a open source tool to help you in codereview, to find/track sinks and this points follow regex rules…How too install,...
HackerOne is one of the most important vulnerability reporting platforms, so it has access to large amounts of information, although sometimes that...
According to web application security specialists, a recently patched vulnerability in Microsoft login system could have been exploited to trick some users...
Data protection specialists from security firm vpnMentor reported the detection of a data breach on a Romanian web platform, owned by tobacco...
A small linux information collection script is mainly used for emergency response. It can be used under Debian or Centos.Features CPU TOP10,...
Burp Suite extension to discover a apikey/tokens from HTTP response. Install download SecretFinder wget https://raw.githubusercontent.com/m4ll0k/BurpSuite-Secret_Finder/master/SecretFinder.pyorgit clone https://github.com/m4ll0k/BurpSuite-Secret_Finder.git now open Burp > Extender...
aSYNcrone is a SYN Flood DDoS Attack Tool!Usage: git clone https://github.com/fatih4842/aSYNcrone.gitcd aSYNcronegcc aSYNcrone.c -o aSYNcrone./aSYNcrone <source IP> <source port> <destination IP> <destination...
Nessus XML Praser Requirements Python3 Django Tested on Ubuntu 18.04 What it does Vulnerability based parsing Service based parsing Host bases parsing...
Sooty is a tool developed with the task of aiding SOC analysts with automating part of their workflow. One of the goals...
CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of malware analysis with the...
ANDRAX is a Penetration Testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like a common...
Documentationhttps://docs.rs/goblin/changelog UsageGoblin requires rustc 1.31.1.Add to your Cargo.toml [dependencies]goblin = "0.1" Features awesome crate name zero-copy, cross-platform, endian-aware, ELF64/32 implementation – wow!...
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments. Quick reference Where to get help: the Pacu/CloudGoat/CCAT...
Subdomain3 is a new generation of tool , It helps penetration testers to discover more information in a shorter time than other...
The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for...
Attack Monitor is Python application written to enhance security monitoring capabilites of Windows 7/2008 (and all later versions) workstations/servers and to automate...
A hacker group has released a new database of stolen payment cards on Joker’s Stash, a popular hacking forum. According to web...
There are currently multiple variants of malware for mobile devices used for different purposes. Digital forensics experts mention that, during the most...
Your private data is being traded and sold all over the internet as we speak. Tons of leaks come out on a...
Data protection experts reported an intrusion that has impacted Adobe Magento Marketplace users, employed to purchase, sell, and download themes and plugins...