VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit Overview A very simple Python framework, inspired by SprayingToolkit, that tries to …
Oh365UserFinder – Python3 O365 User Enumeration Tool
Oh365UserFinder is used for identifying valid o365 accounts and domains without the risk of account lockouts. The tool parses responses …
Nuclei-Burp-Plugin – Nuclei Plugin For BurpSuite
A BurpSuite plugin intended to help with nuclei template generation. Features Template matcher generation Word and Binary matcher creation using …
S1EM – This Project Is A SIEM With SIRP And Threat Intel, All In One
Today, cyber attacks are more numerous and cause damage in companies. Nevertheless, many software products exist to detect cyber threats. …
Severe Vulnerability Patched in CRI-O Container Engine for Kubernetes
A report by CrowdStrike reveals that an extreme weakness affecting the CRI-O container engine for Kubernetes could be utilized to …
Mip22 – An Advanced Phishing Tool
The program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of …
RefleXXion – A Utility Designed To Aid In Bypassing User-Mode Hooks Utilised By AV/EPP/EDR Etc
Introduction RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass …
Patching – An Interactive Binary Patching Plugin For IDA Pro
Patching assembly code to change the behavior of an existing program is not uncommon in malware analysis, software reverse engineering, …
Lnkbomb – Malicious Shortcut Generator For Collecting NTLM Hashes From Insecure File Shares
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The vulnerability exists due to Windows looking for …
Meta Releases Open-Source Browser Extension for Checking Code Authenticity
Meta, which is Facebook’s parent company, has announced the release of new technology that it aims to implement in its …