-
SecureHaus
- Seattle
-
19:59
(UTC -12:00) - @ark0n
🔮 Future ideas
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Interact with your documents using the power of GPT, 100% privately, no data leaks
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑
💚 Secure remote browsing anywhere.
This is Advance Phishing Tool ! OTP PHISHING
OpenVPN road warrior installer for Ubuntu, Debian, AlmaLinux, Rocky Linux, CentOS and Fedora
BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse entities and configurable, traversable attack paths.
it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page
This is a step-by-step guide to implementing a DevSecOps program for any size organization
An OSINT tool that helps detect members of a company with leaked credentials
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applicatio…
Cameradar hacks its way into RTSP videosurveillance cameras

