Explore 6 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Tool to bypass endpoint solutions blocking known 'malicious' signed applications by obtaining valid signed files with different hashes.
Tool to bypass endpoint solutions blocking known 'malicious' signed applications by obtaining valid signed files with different hashes.
A tool for performing hash length extension attacks against multiple hashing algorithms.
A tool for performing hash length extension attacks against multiple hashing algorithms.
A simple IOC scanner bash script for Linux/Unix/OSX systems
A simple IOC scanner bash script for Linux/Unix/OSX systems
A practical guide on NTLM relaying for Active Directory attacks.
A practical guide on NTLM relaying for Active Directory attacks.
An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.
An online hash checker utility that retrieves information from various online sources, including Virustotal, HybridAnalysis, and more.
Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.
Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.