GWTMap – Tool to help map the attack surface of Google Web Toolkit
GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of...
GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of...
tempomail is a standalone binary that allows you to create a temporary email address in 1 Second and receive emails....
Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily...
Instagram offers two kinds of APIs to developers. The Instagram API Platform (extremely limited in functionality and close to being...
Today, we are excited to announce tCell by Rapid7, our next-gen WAF and RASP solution, is now available in the...
Easy brute forcing to whatever you want, Its magic increasing values and direct.ImplementationClone git clone https://github.com/jofpin/brutto.git Download the latest version...
What the heck is a ferox anyway?Ferox is short for Ferric Oxide. Ferric Oxide, simply put, is rust. The name...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
DeepBlueCLI - a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC deepblue at backshore...
Web shell analyzer is a cross platform stand-alone binary built solely for the purpose of identifying, decoding, and tagging files...
There are many potential causes of security breaches, including malicious attacks, system glitches, equipment failures, software bugs, and zero days....
The Trident project is an automated password spraying tool developed to meet the following requirements: the ability to be deployed...
For a list of functions, their usage, and more, check out https://powerzure.readthedocs.ioWhat is PowerZure?PowerZure is a PowerShell project created to...
A Content Security Policy is a protocol that allows a site owner to control what resources are loaded on a...
JM Bullion, the leading online bullion dealer in the United States, has disclosed a data breach, hackers stole customers’ credit...
The UK Information Commissioner’s Office fined US hotels group Marriott over the 2018 data breach that affected millions of customers...
Japan’s Nuclear Regulation Authority (NRA) issued a warning of temporary suspension of its email systems, likely caused by a cyber...
The Maze ransomware operators are shutting down their operations for more than one year the appeared on the threat landscape...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A threat actor is offering for sale account databases containing an aggregate total of 34 million user records stolen from...
This project allows you to easily spin up Active Directory labs in Azure with domain-joined workstations, Windows Event Forwarding, Kibana,...
Collection of PowerShell functions a Red Teamer may use to collect data from a machine or gain access to a...
APICheck is a complete toolset designed and created for testing REST APIs. Why APICheckAPICheck focuses not only in the security...
The Nethive Project provides a Security Information and Event Management (SIEM) insfrastructure empowered by CVSS automatic measurements. FeaturesMachine Learning powered...