LSMS – Linux Security And Monitoring Scripts
Linux Security and Monitoring Scripts. These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events […]
Linux Security and Monitoring Scripts. These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events […]
Description A fiber is a unit of execution that must be manually scheduled by the application rather than rely on the priority-based scheduling mechanism built
Fiber To Run In-Memory Code In A Different And Stealthy Way Read More »
[!UPDATE] Announcing the launch of BurpGPT Pro, the edition specifically tailored to meet the needs of professionals and cyber boutiques. Discover a host of powerful
Burpgpt – A Burp Suite Extension That Integrates OpenAI’s GPT Read More »
C2-Hunter is a program designed for malware analysts to extract Command and Control (C2) traffic from malwares in real-time. The program uses a unique approach
Sandboxes are commonly used to analyze malware. They provide a temporary, isolated, and secure environment in which to observe whether a suspicious file exhibits any
Sandbox Bypass Evasion – Bypass Malware Sandbox Evasion Read More »
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site Scripting vulnerabilities. This tool is only for educational purpose, do
XSS Exploitation Tool is a penetration testing tool Read More »
Python Memory Module pure-python implementation of MemoryModule technique to load a dll or unmanaged exe entirely from memory “Python memory module” AI generated pic
AtomLdr: A DLL loader with evasive features Disclaimer This loader utilizes techniques taught in MalDev Academy. The training will be launched in the upcoming weeks
AtomLdr – A DLL Loader With Advanced Evasive Features Read More »
Description LinkedInDumper is a Python 3 script that dumps employee data from the LinkedIn social networking platform. The results contain firstname, lastname, position (title), location
LinkedInDumper – Tool To Dump Company Employees from API Read More »
Kubestroyer aims to exploit Kubernetes clusters misconfigurations and be the swiss army knife of your Kubernetes pentestsExplore the docs » Report Bug · Request Feature Table of
Discord Voice Channel C2 aka DCVC2. This multi operating system compatible tool was created to leverage Discord’s voice channels for command and control operations. This