Oracle WebLogic Unauthenticated Complete Takeover (CVE-2020-14882): What You Need to Know
What’s up? As if October 2020 hasn’t been scary enough, Rapid7 Labs, the SANS Internet Storm Center (ISC), and other...
What’s up? As if October 2020 hasn’t been scary enough, Rapid7 Labs, the SANS Internet Storm Center (ISC), and other...
In our most recent episode of Security Nation, we spoke with Maria Barsallo Lynch, Executive Director of the Defending Digital...
Spooky season is in full swing, and we’re not just talking about Halloween. Security vulnerabilities can range from tiny errors...
A curated list of Android Security materials and resources For Pentesters and Bug Hunters.BlogAAPG - Android application penetration testing guide...
A project to get a Linux shell running on iOS, using usermode x86 emulation and syscall translation. For the current...
We know that proving the efficacy of your vulnerability management program is no easy task. But with the Goals and...
A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan the contents...
TASER (Testing And SEecurity Resource) is a Python resource library used to simplify the process of creating offensive security tooling,...
In this third installment of our series around 2021 security planning, we’re focused on SOC automation. In part one, we...
jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and...
An extensible application for penetration testers and software developers to decode/encode data into various formats.SetupDecoder++ can be either installed by...
When you start out with one of our vulnerability management solutions, Nexpose or InsightVM, one of the first things you...
Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence...
Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue...
Malware Mutation using Deep Reinforcement Learning and GANsThe purpose of the tool is to use artificial intelligence to mutate a...
What’s AutoGadgetFS ?AutoGadgetFS is an open source framework that allows users to assess USB devices and their associated hosts/drivers/software without...
NoSQL scanner and injector. About NosqliI wanted a better nosql injection tool that was simple to use, fully command line...
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I've compiled...
""" What is this register used for? Hmm.. I'll just rename it to veryuniquename, do a textual search, and find...
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format....
Here at Rapid7, we’ve been quite busy continuously improving, expanding functionality, and testing new features for feedback with our customers...
Malware Source Code Collection!!! DISCLAIMER !!! We do not take any responsibility for any damage done by the code in...
PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...