HBSQLI – Automated Tool For Testing Header Based Blind SQL Injection
HBSQLI is an automated command-line tool for performing Header Based Blind SQL injection attacks on web applications. It automates the...
HBSQLI is an automated command-line tool for performing Header Based Blind SQL injection attacks on web applications. It automates the...
This is an alpha release of an assemblies.blob AssemblyStore parser written in Python. The tool is capable of unpack and...
(Currently) Fully Undetected same-process native/.NET assembly shellcode injector based on RecycledGate by thefLink, which is also based on HellsGate +...
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records....
Sirius is the first truly open-source general purpose vulnerability scanner. Today, the information security community remains the best and most...
Daksh SCRA (Source Code Review Assist) tool is built to enhance the efficiency of the source code review process, providing...
Attaches to Chrome using its Remote DevTools protocol and steals/injects/clears/deletes cookies. Heavily inspired by WhiteChocolateMacademiaNut. Cookies are dumped as JSON...
Escalate Service Account To LocalSystem via Kerberos. Traditional Potatoes Friends familiar with the "Potato" series of privilege escalation should know...
Caracal is a static analyzer tool over the SIERRA representation for Starknet smart contracts. Features Detectors to detect vulnerable Cairo...
Mozilla Releases Security Updates for Multiple Products Mozilla has released security updates to address a vulnerability affecting Firefox, Firefox ESR,...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA and NSA Release New Guidance on Identity and Access Management Today, CISA and the National Security Agency (NSA) published...
CISA Adds Two Known Exploited Vulnerabilities to Catalog, Removes Five KEVs CISA has added two new vulnerabilities to its Known Exploited...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations Today, the National Security Agency (NSA) and Cybersecurity and Infrastructure...
Atlassian Releases Security Advisory for Confluence Data Center and Server Atlassian released a security advisory to address a vulnerability affecting...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on October 5, 2023. These...
Cisco Releases Security Advisories for Multiple Products Cisco released security advisories for vulnerabilities affecting multiple Cisco products. A remote cyber...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on September 28, 2023. These...
Apple Releases Security Updates for Multiple Products Apple has released security updates to address vulnerabilities in multiple products. A cyber...