Bxss – A Blind XSS Injector Tool
A Blind XSS Injector tool FeaturesInject Blind XSS payloads into custom headers Inject Blind XSS payloads into parameters Uses Different...
A Blind XSS Injector tool FeaturesInject Blind XSS payloads into custom headers Inject Blind XSS payloads into parameters Uses Different...
CRLFMap is a tool to find HTTP Splitting vulnerabilitiesWhy?I wanted to write a tool in Golang for concurrency I wanted...
A Payload Injector for bugbounties written in go FeaturesInject multiple payloads into all parameters Inject single payloads into all parameters...
Pipe different tools with google dork Scanner Installzoid@MSI ~/dorkX> git clone https://github.com/ethicalhackingplayground/dorkX zoid@MSI ~/dorkX> cd dorkX zoid@MSI ~/dorkX> go build...
On Tuesday September 15th, the US House unanimously passed the IoT Cybersecurity Improvement Act . The bill, sponsored by Reps....
Let’s talk about the reality of the remediation process today. We know it is often a cumbersome and time-consuming process,...
Utility to find AES keys in running process memory. Works for 128, 192 and 256-bit keys. UsageOpen aes-finder.sln solution in...
croc is a tool that allows any two computers to simply and securely transfer files and folders. AFAIK, croc is...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
ADE - ActiveDirectoryEnumusage: activeDirectoryEnum dc ___ __ _ ____ _ __ ______ / | _____/ /_(_) _____ / __ (_)_______...
Abusing Kerberos Resource-Based Constrained DelegationTL;DRThis repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows Active...
Earlier this year, Rapid7 and Snyk partnered together with the goal of securing cloud-native apps across the software development lifecycle...
ä¸æ–‡ç‰ˆ(Chinese version)Disclaimer: The technology involved in this project is only for security learning and defense purposes, illegal use is prohibited!Bypass...
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and antivirus solutions. It digests malicious...
Earlier today, security firm Secura published a technical paper on CVE-2020-1472, a CVSS-10 privilege escalation vulnerability in Microsoft’s Netlogon authentication...
Vulnerability management programs look different depending on the available resources and specific risks your organization faces. While both identifying and...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
DockerENT is activE ruNtime application security scanning Tool (RAST tool) and framework which is pluggable and written in python. It...
HTTP-revshell is a tool focused on redteam exercises and pentesters. This tool provides a reverse connection through the http/s protocol....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Gaming hardware manufacturer Razer suffered a data leak, an unsecured database managed by the company containing gamers’ info was exposed...
The Development Bank of Seychelles (DBS) was hit by a ransomware attack disclose the Central Bank of Seychelles (CBS). The Central...
The INVDoS (Bitcoin Inventory Out-of-Memory Denial-of-Service)Attack would have allowed hackers to crash Bitcoin nodes and alternative chains. Two years ago,...
A cybercrime group named Malà smoke has been targeting porn sites over the past months with malicious ads redirecting users to...