The pentester's Swiss knife
Cryptomator Cryptomator is provided free of charge as an open-source project despite the high development effort and is therefore dependent on donations. Cryptomator offers multi-platform transparent client-side encryption of your files in the cloud....
kics KICS stands for Keeping Infrastructure as Code Secure, it is open source and is a must-have for any cloud-native project. Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx....
LayeredSyscall Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR hooks in Windows. The general idea is to generate a legitimate call stack before...
Remote Method Guesser Remote Method Guesser (rmg) is a command-line utility written in Java and can be used to identify security vulnerabilities on Java RMI endpoints. Currently, the following operations are supported: List available bound names and their...
HybridTestFramewrok In the era of the cloud-native world, we cannot stick to a particular framework, however, due to project requirements we often need to evolve the existing testing solution in such a way that...
MyMSIAnalyzer You have probably come across MSI files quite often. They are used by software manufacturers to provide their programs. This format is more convenient than the standard EXE format for the following reasons:...
kubeclarity KubeClarity is a tool for the detection and management of Software Bill Of Materials (SBOM) and vulnerabilities of container images and filesystems. It scans both runtime K8s clusters and CI/CD pipelines for enhanced...
Watcher Watcher is a Django & React JS automated platform for discovering new potential cybersecurity threats targeting your organization. It should be used on web servers and available on Docker. Watcher capabilities Detect emerging...
For the most exciting thing to do in Edmonton, I recommend you to check out My Locked Room Escape Rooms. With its location in the middle of the city, this adrenaline-filled playground enforces tough...
In an increasingly digital age, protecting financial systems from illegal activity has become more critical than ever. One of the key mechanisms for ensuring this protection is AML verification, short for Anti-Money Laundering verification....
SHELLSILO SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the process of constructing and utilizing structures, assigning variables, and making system calls. With this...
BPF Compiler Collection (BCC) BCC is a toolkit for creating efficient kernel tracing and manipulation programs and includes several useful tools and examples. It makes use of extended BPF (Berkeley Packet Filters), formally known...
SharpDPAPI SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi‘s Mimikatz project. The SharpChrome subproject is an adaptation of work from @gentilkiwi and @djhohnstein, specifically his SharpChrome project. However, this version of SharpChrome uses a different version of the C# SQL library that...
Interactive PDF Analysis Interactive PDF Analysis (also called IPA) allows any researcher to explore the inner details of any PDF file. PDF files may be used to carry malicious payloads that exploit vulnerabilities and...
SlackEnum A user enumeration tool for Slack. Setup Clone this repository and install the necessary dependencies with the commands below. Create the cookies_dir and http_requests_dir folders defined in the settings at the top of slackenum.py. By default, these are slack_ids-cookiebro and slack_ids-burp and...
LNAV — The Logfile Navigator The log file navigator, lnav, is an enhanced log file viewer that takes advantage of any semantic information that can be gleaned from the files being viewed, such as...