Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
According to the M-Trends 2021 report by FireEye, the median time for an attacker to remain unnoticed in an enterprise's …
Read MoreExploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Mobile app development needs to focus on cybersecurity, just as much as it does on functionality and flexibility, if not …
Read MoreAPI Key, a Key to Credential Leakage & Manipulation
Django, is a Python-based web framework that allows developers to easily create secure and maintainable websites. This free open source …
Read MoreRekono - Execute full pentesting processes combining multiple hacking tools automatically
Rekono combines other hacking tools and their results to execute complete pentesting processes against a target in an automated way. …
Read Morehoaxshell - An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic
Purpose hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it …
Read MoreHakrawler - A fast CLI web crawler for hackers
Fast golang web crawler for gathering URLs and JavaScript file locations. This is basically a simple implementation of the awesome …
Read Moreffuf - Fuzz Faster U Fool
Sponsors Official Discord Channel ffuf has a channel at Porchetta Industries Discord server alongside of channels for many other tools. …
Read MoreGenact - a nonsense activity generator
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with …
Read MoreGlances - A top/htop alternative for GNU/Linux, BSD, MacOS and Windows
Glances is a cross-platform monitoring tool that aims to present a large amount of monitoring information through a curse or …
Read Morenavi - An interactive cheatsheet tool for the command-line
navi allows you to browse through cheatsheets (that you may write yourself or download from maintainers) and execute commands. Suggested …
Read More