3 Common Threats to Look for in Your Network Data
Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...
Continuously monitoring your network activity for signs of attack is a great way to catch hackers and breaches before they...
RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam To Run: You can either run locally...
Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order...
In a survey conducted by the Ponemon Institute and Domain Tools, 51% of respondents said they believe that automation will...
FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal...
This is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live...
Let's start off talking about CVE-2020-0688 from last month -- the Microsoft Exchange Validation Key RCE vulnerability. At the time...
In a recent episode of Rapid7’s podcast, Security Nation, we talked with Nick Percoco, the creator of Chicago-based security conference...
This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear...
About Proton FrameworkProton Framework is a Windows post exploitation framework similar to other penetration testing tools such as Meterpreter and...
This is the final post in our four-part series on security in the cloud. In part one, we discussed the...
Note that the tool is still under development. Things may break anytime - hence, beta!A fast and flexible NTLM reconnaissance...
HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides...
Today there are many ways to create a reverse shell in order to be able to remotely control a machine...
Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for...
To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release...
Ghost Framework is an Android post exploitation framework that uses anAndroid Debug Bridge to remotely access an Android device. Ghost...
This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker...
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is...
This post describes CVE-2019-5648, a vulnerability in the Barracuda Load Balancer ADC. A malicious actor who gains authenticated, administrative access...
This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...
Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...
About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...
All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...