ReconNote Web Application Security Recon Automation Framework It takes user input as a domain name and maximizes the attack surface…
ReconNote Web Application Security Recon Automation Framework It takes user input as a domain name and maximizes the attack surface…
A user of the child abuse forum Playpen was sentenced to ten years in prison for downloading child pornography. (via…
Under normal circumstances, Google’s Project Zero will reserve 90 days for developers to fix after the vulnerability is discovered. After…
The Nethive Project provides a Security Information and Event Management (SIEM) insfrastructure empowered by CVSS automatic measurements. Features Machine Learning…
npq safely* install packages with npm/yarn by auditing them as part of your install process. npq will perform the following steps…
The purpose of this project is to analyse a raw binary firmware and determine automatically some of its features. This…
Raccine A Simple Ransomware Protection Why We see ransomware delete all shadow copies using vssadmin pretty often. What if we could…
eDEX-UI is a fullscreen, cross-platform terminal emulator and system monitor that looks and feels like a sci-fi computer interface. Heavily…
Recently, we detected that the latest patch of CVE-2020-14882, Oracle Weblogic Console Remote Code Execution vulnerability can be bypassed. The…
hetty Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software…