Why crack hashes when you can bust them? Features Automatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract & crack hashes fromRead more
An open source serveo/ngrok alternative. Deploy Builds are made automatically for each commit to the repo and are pushed to Dockerhub. Builds are tagged usingRead more
All in one tools for CRYPTOLOGY. Instagram: Capture the Root Screenshots How to use [embedded content] This tool include: CHACHA20POLY1305 TRANSPOSITION DIFFIE HELMAN IMAGE ENCRYPT/DECRYPTRead more
DeepBlueCLI – a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC deepblue at backshore dot net Twitter: @eric_conrad http://ericconrad.comRead more
“MEDUZA” (“медуза”) means “jellyfish” in Ukrainian What is MEDUZA? It’s a Frida-based tool, my replacement for SSLKillSwitch. I created it for in-house use, but thenRead more
Mihari is a helper to run queries & manage results continuously. Mihari can be used for C2, landing page and phishing hunting. How it worksRead more
Sinter is a 100% user-mode endpoint security agent for macOS 10.15 and above, written in Swift.Sinter uses the user-mode EndpointSecurity API to subscribe to andRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!