Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by automatically: executing Kali …
STEWS – A Security Tool For Enumerating WebSockets
STEWS is a tool suite for security testing of WebSockets This research was first presented at OWASP Global AppSec US …
Microsoft’s Loop Project Management Software
Microsoft has been developing a project collaboration solution for enterprise projects. The Loop app is now accessible to Microsoft 365 …
Forbidden – Bypass 4Xx HTTP Response Status Codes
Bypass 4xx HTTP response status codes. Based on PycURL. Script uses multithreading, and is based on brute forcing so might …
IAM Vulnerable – Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground. IAM Vulnerable uses the Terraform binary …
IDA2Obj – Static Binary Instrumentation
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly …
Crawpy – Yet Another Content Discovery Tool
Yet another content discovery tool written in python. What makes this tool different than others: It is written to work …
ShonyDanza – A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain …
Warning: Cyberattacks Are on The Rise! IKEA’S Emailing Compromised
Phishing is an email or SMS from an imposter pretending to be from a legitimate brand to induce people to …
ZipExec – A Unique Technique To Execute Binaries From A Password Protected Zip
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then …