Microsoft has been developing a project collaboration solution for enterprise projects. The Loop app is now accessible to Microsoft 365 …
Forbidden – Bypass 4Xx HTTP Response Status Codes
Bypass 4xx HTTP response status codes. Based on PycURL. Script uses multithreading, and is based on brute forcing so might …
IAM Vulnerable – Use Terraform To Create Your Own Vulnerable By Design AWS IAM Privilege Escalation Playground
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground. IAM Vulnerable uses the Terraform binary …
IDA2Obj – Static Binary Instrumentation
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly …
Crawpy – Yet Another Content Discovery Tool
Yet another content discovery tool written in python. What makes this tool different than others: It is written to work …
ShonyDanza – A Customizable, Easy-To-Navigate Tool For Researching, Pen Testing, And Defending With The Power Of Shodan
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain …
Warning: Cyberattacks Are on The Rise! IKEA’S Emailing Compromised
Phishing is an email or SMS from an imposter pretending to be from a legitimate brand to induce people to …
ZipExec – A Unique Technique To Execute Binaries From A Password Protected Zip
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then …
Digital-Forensics-Lab – Free Hands-On Digital Forensics Labs For Students And Faculty
Features of Repository =================== Hands-on Digital Forensics Labs: designed for Students and Faculty Linux-based lab: All labs are purely based …
DetectionLabELK – A Fork From DetectionLab With ELK Stack Instead Of Splunk
DetectionLabELK is a fork from Chris Long’s DetectionLab with ELK stack instead of Splunk. Description: DetectionLabELK is the perfect lab …