A cyber-attack is a malicious attack undertaken by cybercriminals against single or numerous computers, computer systems, networks, or infrastructures utilizing …
AutoResponder – Carbon Black Response IR Tool
AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the help of Carbon …
CVE-Tracker – With The Help Of This Automated Script, You Will Never Lose Track Of Recently Released CVEs
With the help of this automated script, you will never lose track of newly released CVEs. What does this powershell …
Zi – A Swiss Army Knife for Zsh – Unix Shell
A Swiss Army Knife for Zsh – Unix Shell. Roadmap See the open issues for a list of proposed features …
Email-Prediction-Asterisks – Script That Allows You To Identify The Emails Hidden Behind Asterisks
Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect …
Malicious-Pdf – Generate A Bunch Of Malicious Pdf Files With Phone-Home Functionality
Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh Used for penetration …
Cliam – Multi Cloud IAM Permissions Enumeration Tool
Multi cloud iam permissions enumeration tool. Currently covers: AWS GCP [TODO] Azure [TODO] Oracle Description Cliam is a simple cloud …
A Step-By-Step Guide on How To Remove Ransomware?
Prevention is always recommended when it comes to ransomware infections. Nevertheless, there are numerous ways to recover lost data whenever …
FirmWire -b Full-System Baseband Firmware Emulation Platform For Fuzzing, Debugging, And Root-Cause Analysis Of Smartphone Baseband Firmwares
FirmWire is a full-system baseband firmware analysis platform that supports Samsung and MediaTek. It enables fuzzing, root-cause analysis, and debugging …
Pybatfish – Python Client For Batfish (Network Configuration Analysis Tool)
Pybatfish is a Python client for Batfish. What is Batfish? Batfish is a network validation tool that provides correctness guarantees …