Killchain – A Unified Console To Perform The “Kill Chain” Stages Of Attacks
What is “Kill Chain”?From Wikipedia: The term kill chain was originally used as a military concept related to the structure...
What is “Kill Chain”?From Wikipedia: The term kill chain was originally used as a military concept related to the structure...
A security framework for enterprises and Red Team personnel, supports CobaltStrike's penetration testing of other platforms (Linux / MacOS /...
This blog post is part two of a two-part series. For more insights from Gisela and Carlota, check out part...
Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?Let's...
Mihari is a helper to run queries & manage results continuously. Mihari can be used for C2, landing page and...
“I think the best way to tell a story is by starting at the end, briefly, then going back to...
Tested environments: Windows, MAC, linux, and windows subsystem for linux (WSL) What can SourceWolf do? Crawl through responses to find...
iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis.iblessing is based...
A golang utility to spider through a website searching for additional links with support for JavaScript rendering.Installgo get -u github.com/iamstoxe/urlgrabFeaturesCustomizable...
Osintgram is a OSINT tool on Instagram.Osintgram offers an interactive shell to perform analysis on Instagram account of any users...
Create a vulnerable active directory that's allowing you to test most of active directory attacks in local lab.Main FeaturesRandomize AttacksFull...
Bluescan is a open source project by Sourcell Xu from DBAPP Security HatLab. Anyone may redistribute copies of bluescan to...
SharpHose is a C# password spraying tool designed to be fast, safe, and usable over Cobalt Strike's execute-assembly. It provides...
Bpytop, bashtop python port is now available at https://github.com/aristocratos/bpytopIt's a lot faster and about a third as cpu heavy and...
Public policy and the Internet of ThingsOver the past few years, the security of the Internet of Things (IoT) has...
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it...
ezEmu enables users to test adversary behaviors via various execution techniques. Sort of like an "offensive framework for blue teamers",...
Well, it's March 179th, 2020, and while we didn't actually get a summer here in 2020, it's time once again...
While giving our talk at the DEF CON Red Team Village a couple of weeks ago, I previewed a PowerShell...
Over the weekend, we were setting up a virtual range for our upcoming class this weekend and was testing a mail server....
Last month we taught our DEF CON 27 workshop, Introduction to Sandbox Evasion and AMSI Bypasses, as a webinar. It...
Anthony Rose | Jake Krasnov As part of the update to Empire that we pushed out today, the OneDrive listener...
Vincent Rose | Jacob Krasnov | Anthony Rose Today we are excited to announce the release of Starkiller! Our multi-user...
Jacob Krasnov | Anthony Rose This blog is going to be the first entry in a series that goes over...