Invoker – Penetration Testing Utility
Penetration testing utility.The goal is to use this tool when access to some Windows OS features through GUI is restricted.Some...
Penetration testing utility.The goal is to use this tool when access to some Windows OS features through GUI is restricted.Some...
From the comfort of the Gloucester Shed—my “home office” that’s now gaining notoriety internally at Rapid7—I recently watched three colleagues...
Internet users have been alerted by national federal cybersecurity agency against a fake email campaign that is going on in...
Dreambot's backend servers as per a report published by the CSIS Security Group, a cyber-security firm situated in Copenhagen, seem...
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a...
A tool to assess data quality, built on top of the awesome OSSEM project.MissionAnswer the question: I want to start...
According to Kaspersky Lab, in April, the number of attacks on the infrastructure of Russian organizations whose employees work remotely...
SophosLabs, a cybersecurity firm has discovered a range of apps on Google Play Store and Apple's iOS App Store whose...
Integration of Clair and Docker Registry (supports both Clair API v1 and v3)Klar is a simple tool to analyze images...
PowerShell script for connecting to a remote host.Remote host will have full control over client's PowerShell and all its underlying...
In the last few weeks, there has been an upswing in people receiving threatening, extortion email messages, demanding payment to...
Some independent security software affiliates are scamming people by sending emails with the false message that their antivirus is expiring...
Sharing has become a thing with cyber-criminals and their malware mechanisms. Reportedly, LeetHozer botnet was found to have similar attack...
Stupidly easy to use, small footprint Policy as Code subsecond command-line scanner that leverages the power of the fastest multi-line...
About Thoron FrameworkThoron Framework is a Linux post-exploitation framework that exploitLinux tcp vulnerability to get shell-like connection. Thoron Framework is...
By Raphael Centeno, Mc Justine De Guzman, and Augusto Remillano II The coronavirus pandemic has highlighted the usefulness of communication...
Cybercrime and the economy have always been intertwined, but with COVID-19 on the road to causing a seemingly inevitable global...
So as to address a high severity vulnerability, the “Real-Time Find and Replace” WordPress plugin was updated as of late...
Reportedly, the United Kingdom declared that their coronavirus tracing application is being run via centralized British servers and that’s how...
The new Chrome 81 version released on April 7th by Google for Windows, Mac, and Linux primarily focused on security...
For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of...
SkyWrapper is an open-source project which analyzes behaviors of temporary tokens created in a given AWS account. The tool is...
Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes...
In the second session of our Remote Work Readiness Series, Rapid7’s own security and business experts shared their advice for...