The most common techniques to bypass AppLocker
PowerShell Module for Threat Hunting via Windows Event Logs
A tool that tracks your keypresses and stores them locally
Easier & faster Kubernetes policies using JavaScript or TypeScript
Web path scanner
Open source tool that improves identification of vulnerabilities
Fast Go web crawler for discovering URLs and web app endpoints
Multi-cloud OSINT tool for discovering public cloud resources
Identify emails, IP addresses, and more
Next-Generation Linux Kernel Exploit Suggester
Pure Go HS256/384/512 JWT Token Brute-force Cracker
A cheat sheet that contains common enumeration and attack methods
A post exploitation framework designed to operate covertly
Kubernetes multi-cluster management and publishing platform
Look up IP addresses using favicon hashes via Shodan
SLS Team Java Library
Re-play Security Events
The best cryptography playground available
An Application to security test RESTful web APIs.
Prediction of proteinfolding in 2D HP model
A demo for using JWT (Json Web Token) with Spring Security
powerful and useful hacker dictionary builder for a brute-force attack
Json-rpc client
360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs