Redcloud – Automated Red Team Infrastructure Deployement Using Docker
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...
Maximizing BloodHound.DescriptionNew Release: dpat - The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info - Pull...
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down...
The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community...
Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies...
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts,...
Today, Rapid7 just released the first in our all-new Industry Cyber-Exposure Report (ICER) series. For those of you who have...
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection...
The Commissioner Jules Maigret is a fictional French police detective, created by Georges Simenon. His investigation method is based on...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
Log data is critical to ensuring that you have full visibility into what’s going on across your environment. Alongside endpoint...
2021 is off and running! The big question on the corporate world’s mind is, of course, “What will work life...
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.Supported VersionsWindows 10 1507,...
Get SharpHoundThe latest build of SharpHound will always be in the BloodHound repository here Compile InstructionsSharpHound is written using C#...
Quick tool to help make evasion work a little bit easier. Takes a binary as input and splits it until...
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights...