TheCl0n3r – Tool To Download And Manage Your Git Repositories
TheCl0n3r will allow you to download and manage your git repositories. PrefaceAbout 90% of the penetration testing tools used in...
TheCl0n3r will allow you to download and manage your git repositories. PrefaceAbout 90% of the penetration testing tools used in...
Project Eagle is a plugin based vulnerabilities scanner with threading support used for detection of low-hanging bugs on mass scale...
hack-browser-data is an open-source tool that could help you decrypt data (passwords / bookmarks / cookies / history) from the...
Mail Swipe is a python script that helps you to create temporary email addresses and receive emails at that address....
Zracker is a Zip File Password BruteForcing Utility Tool based on CPU-Power. Yet available for Linux only ... Supports WordList...
Let’s talk about false positives. They’re frustrating and faulty, but also about as certain as death and taxes for anyone...
Rapid7 detection and response customers have access to, and insights from, our experts and research driving the industry forward. This...
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4 This is reworked original Mikrotik Exploit. Added Python 2 compatibility...
"MEDUZA" ("медуза") means "jellyfish" in Ukrainian What is MEDUZA?It's a Frida-based tool, my replacement for SSLKillSwitch. I created it for...
Managing security for the largest Dental Support Organization (DSO) in the United States is no easy task. And sometimes, you...
by Bob Rudis If you’re in the U.S. and were waiting for an “October surprise”, look no further than CVE-2020-16898...
Nuubi Tools: Information-ghatering|Scanner|Recon Options: -h/--help | Show help message and exitArguments: -b/--banner | Banner grabing of target ip address -s/--subnet...
Why?If you try to learn a little bit more about crypto, either because you want to know how the attacks...
Microsoft brings us an October's Update Tuesday with 87 vulnerabilities, a sub-100 number we haven't experienced in quite some time....
This is the second installment of our series around 2021 security planning. In part one, Rapid7 Detection and Response Practice...
Attacks on WiFi networks are well known in the cybersecurity world, as an established technique for penetrating a target. The Hak5 WiFi...
Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover, or office.com login page.Usageo365enum will read usernames from the file provided...
A proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the browser....
In July, we provided a rundown of what was new in InsightIDR, our cloud-based SIEM tool, from the first half...
Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will...
Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI Installationgit clone https://github.com/Mrakovic-ORG/NashaVM --recursecd NashaVMNashaVMnuget...
SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities...
c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points,...
As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry...