MUD-Visualizer – A Tool To Visualize MUD Files
This tool can be used to visualize the MUD files in JSON format. MotivationMUD files are plain text files in...
This tool can be used to visualize the MUD files in JSON format. MotivationMUD files are plain text files in...
PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team...
Customized Password/Passphrase List inputting Target InfoInstallationgit clone https://github.com/edoardottt/longtongue.git cd longtongue python3 longtongue.pyUsageusage: longtongue.py Customized Password/Passphrase List inputting Target Infooptional arguments:...
hide processes and filescurrently emp3r0r uses libemp3r0r to hide its files and processes, which utilizes glibc hijacking persistencecurrently implemented methods:...
Credential Dumping Tool for SolarWinds Orion Blog post: https://malicious.link/post/2020/solarflare-release-password-dumper-for-solarwinds-orion/Credit to @asolino, @gentilkiwi, and @skelsec for helping me figuring out DPAPI....
A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces...
A script that can see if an email address is valid in Office365. This does not perform any login attempts,...
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface. The main goal is...
How many of you got that call at the beginning of the pandemic to make your company’s workforce 100% capable...
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it...
Improvements made to the Goals and SLAs wizardWe’re excited to announce that creating a goal or SLA in InsightVM just...
MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com).Legal Disclaimer:Usage of MaskPhish for...
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
This is a tool that allows you to offensively use YARA to apply a filter to the events being reported...
Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in...
When it comes to offloading security controls to the cloud, it may seem counterintuitive to the notion of “securing” things....
MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. Features:Verification Service { Check...
urlhunter is a recon tool that allows searching on URLs that are exposed via shortener services such as bit.ly...
byp4xx.sh __ __ __ / /_ __ ______ / // / _ ___ __ / __ / / / /...
HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world....
BinwalkWhen mucking about with firmware (the packaged operating system and applications that makes IoT devices go), Binwalk from Refirm Labs...
Not to start off another blog post about how insane this year has been, but let’s just take a moment...
Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user...