Bunkerized-Nginx – Nginx Docker Image Secure By Default
nginx Docker image secure by default. Avoid the hassle of following security best practices each time you need a web...
nginx Docker image secure by default. Avoid the hassle of following security best practices each time you need a web...
An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.InstallationRedShell runs...
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB"). The sandbox is used by Windows Defender...
Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to...
Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks....
OpenCRX version 4.30 and version 5.0-20200717 suffers from an unverified password change vulnerability, which is an instance of CWE-620. This...
ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to...
The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to...
The cloud remains a dominant technology innovation well into its second decade of existence. However, after all this time, certain...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts....
Security Incident Response Automated Simulations (SIRAS) are internal/controlled actions that provide a structured opportunity to practice the incident response plan...
A (coverage-)guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated...
Routopsy is a toolkit built to attack often overlooked networking protocols. Routopsy currently supports attacks against Dynamic Routing Protocols (DRP)...
Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell.CompatibilityRun the script check-compatibility.ps1 to...
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports. Jira IntegrationNotePlease keep in...
Tool to manipulate and insert tracking pixels into Office Open XML documents. FeaturesInsert tracking pixels into Office Open XML documents...
Time for another Kali Linux release! – Kali Linux 2020.4. This release has various impressive updates:ZSH is the new default...
It’s time for another Metasploit community CTF! We're back on our usual end-of-year schedule this time around, and we’re doing...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources...
We at OpenEDR believe in creating a cybersecurity platform with its source code openly available to public, where products and...
The US Senate unanimously passed the IoT Cybersecurity Improvement Act (H.R.1668) yesterday. The US House passed the bill in September,...
Longtime fans of our Under the Hoodie video series may have noticed that this year’s videos looked, well, a little...