PCWT – A Web Application That Makes It Easy To Run Your Pentest And Bug Bounty Projects
A web application that makes it easy to run your pentest and bug bounty projects.DescriptionThe app provides a convenient web...
A web application that makes it easy to run your pentest and bug bounty projects.DescriptionThe app provides a convenient web...
The Belfast Team Partaking in #Rapid7GivesBack Month If you like the site, please consider joining the telegram channel or supporting...
The ShowStopper project is a tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or...
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like...
Using this script, you can configure a number of JavaScript files on websites that you want to monitor. Everytime you...
Threagile (see https://threagile.io for more details) is an open-source toolkit for agile threat modeling: It allows to model an architecture...
GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of...
tempomail is a standalone binary that allows you to create a temporary email address in 1 Second and receive emails....
Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily...
Instagram offers two kinds of APIs to developers. The Instagram API Platform (extremely limited in functionality and close to being...
Today, we are excited to announce tCell by Rapid7, our next-gen WAF and RASP solution, is now available in the...
Easy brute forcing to whatever you want, Its magic increasing values and direct.ImplementationClone git clone https://github.com/jofpin/brutto.git Download the latest version...
What the heck is a ferox anyway?Ferox is short for Ferric Oxide. Ferric Oxide, simply put, is rust. The name...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
DeepBlueCLI - a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC deepblue at backshore...
Web shell analyzer is a cross platform stand-alone binary built solely for the purpose of identifying, decoding, and tagging files...
There are many potential causes of security breaches, including malicious attacks, system glitches, equipment failures, software bugs, and zero days....
The Trident project is an automated password spraying tool developed to meet the following requirements: the ability to be deployed...
For a list of functions, their usage, and more, check out https://powerzure.readthedocs.ioWhat is PowerZure?PowerZure is a PowerShell project created to...
A Content Security Policy is a protocol that allows a site owner to control what resources are loaded on a...
JM Bullion, the leading online bullion dealer in the United States, has disclosed a data breach, hackers stole customers’ credit...
The UK Information Commissioner’s Office fined US hotels group Marriott over the 2018 data breach that affected millions of customers...
Japan’s Nuclear Regulation Authority (NRA) issued a warning of temporary suspension of its email systems, likely caused by a cyber...
The Maze ransomware operators are shutting down their operations for more than one year the appeared on the threat landscape...