Rapid7 Quarterly Threat Report: 2020 Q1
If calendars still hold any meaning for you, you may be dimly aware that it's now midway through the second...
If calendars still hold any meaning for you, you may be dimly aware that it's now midway through the second...
Instagram hacks: Track unfollowers, Increase your followers, Download Stories, etcFeatures:Unfollow TrackerIncrease FollowersDownload: Stories, Saved Content, Following/followers list, Profile InfoUnfollow all...
In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning...
The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network...
Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation...
Bing-ip2hosts is a Bing.com web scraper to discover hostnames by IP address.DescriptionBing-ip2hosts is a Bing.com web scraper that discovers hostnames...
Please note: We take Vault's security and our users' trust very seriously. If you believe you have found a security...
ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you...
ANDRAX is a Penetration Testing platform developed specifically for Android smartphones, ANDRAX has the ability to run natively on Android so it behaves like...
Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, ...)Legal disclaimer:Usage of DroidFiles for attacking targets...
All-in-one tool for managing vulnerability reportsWhyThe goal of Purify to be an easy-in-use and efficient tool to simplify a workflow...
Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the...
Where we would expect the “day interval” to simply count up from 0 (only appeared one day) to 1,2,3, etc.,...
RepoPeek is a Python script to get details about a repository without cloning it. All the information are retrieved using...
Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with...
For fast-moving security teams today, it’s about doing more with less—in other words, leveraging the tools and resources you use...
QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all...
FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new...
Now more than ever, healthcare workers need and deserve top-notch technical support. But between skyrocketing demand for telepractitioners and rising...
Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled...
Working and learning have gone remote, and we have to come to terms with this new reality. Nowadays, several organizations...
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This...
Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass...