Posh C2 Detected – 88[.]210[.]9[.]139:443
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
This is a GCP resource scanner that can help determine what level of access certain credentials possess on GCP. The...
JSpector is a Burp Suite extension that passively crawls JavaScript files and automatically creates issues with URLs, endpoints and dangerous...
HBSQLI is an automated command-line tool for performing Header Based Blind SQL injection attacks on web applications. It automates the...
This is an alpha release of an assemblies.blob AssemblyStore parser written in Python. The tool is capable of unpack and...
(Currently) Fully Undetected same-process native/.NET assembly shellcode injector based on RecycledGate by thefLink, which is also based on HellsGate +...
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records....
Sirius is the first truly open-source general purpose vulnerability scanner. Today, the information security community remains the best and most...
Daksh SCRA (Source Code Review Assist) tool is built to enhance the efficiency of the source code review process, providing...
Attaches to Chrome using its Remote DevTools protocol and steals/injects/clears/deletes cookies. Heavily inspired by WhiteChocolateMacademiaNut. Cookies are dumped as JSON...
Escalate Service Account To LocalSystem via Kerberos. Traditional Potatoes Friends familiar with the "Potato" series of privilege escalation should know...
Caracal is a static analyzer tool over the SIERRA representation for Starknet smart contracts. Features Detectors to detect vulnerable Cairo...
Mozilla Releases Security Updates for Multiple Products Mozilla has released security updates to address a vulnerability affecting Firefox, Firefox ESR,...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA and NSA Release New Guidance on Identity and Access Management Today, CISA and the National Security Agency (NSA) published...
CISA Adds Two Known Exploited Vulnerabilities to Catalog, Removes Five KEVs CISA has added two new vulnerabilities to its Known Exploited...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations Today, the National Security Agency (NSA) and Cybersecurity and Infrastructure...
Atlassian Releases Security Advisory for Confluence Data Center and Server Atlassian released a security advisory to address a vulnerability affecting...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on October 5, 2023. These...
Cisco Releases Security Advisories for Multiple Products Cisco released security advisories for vulnerabilities affecting multiple Cisco products. A remote cyber...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic...