The SpecterOps project management and reporting engine
-
Updated
May 31, 2024 - Python
The SpecterOps project management and reporting engine
Mandatory Access Control (MAC) is a stringent security protocol that dictates how resources are allocated and who has access rights within a computing environment.
Info Sec home lab blog
THAMARA - Threat Hunting with AMSI and YARA
A Blazing fast Security Auditing tool for Kubernetes
VulNyx is a website that contains a list of vulnerable machines that are Unix based.
TOR VPN - USE TOR LIKE VPN
OWASP Honeypot, Automated Deception Framework.
A secure and user-friendly password encryption and decryption tool, leveraging advanced cryptography for reliable password management.
Offensive Security Research, Corporate Espionage Investigation
Writeups from HTB, THM, and various CTFs.
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Shade_hunt is an open-source Node.js brute force tool designed to test the security and authentication of systems. With a minimalistic and highly customizable interface, it allows for testing different types of authentication, from simple passwords to API keys and access tokens.
Tools & Cases
lightweight http redirector written in nim
Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more
All things Cybersecurity!
List of various ethical hacking tools
Common (and Advanced) Information Security Questions. Questions you should know the answer to for your information security career.
Add a description, image, and links to the informationsecurity topic page so that developers can more easily learn about it.
To associate your repository with the informationsecurity topic, visit your repo's landing page and select "manage topics."