HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates on top of Windows...
Search Results For - Diagram
We at OpenEDR believe in creating a cybersecurity platform with its source code openly available to public, where products and services can be provisioned and...
Process Herpaderping is a method of obscuring the intentions of a process by modifying the content on disk after the image has been mapped. This results in...
Threagile (see for more details) is an open-source toolkit for agile threat modeling: It allows to model an architecture with its assets in an agile fashion as...
The Trident project is an automated password spraying tool developed to meet the following requirements: the ability to be deployed on several cloud...
LOLBITS is a C2 framework that uses Microsoft’s Background Intelligent Transfer Service (BITS) to establish the communication channel between the...
PENIOT is a penetration testing tool for Internet of Things (IoT) devices. It helps you to test/penetrate your devices by targeting their internet connectivity...
Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate...
SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a additive feedback loop...
StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside text by compressing and encrypting with...