Managing Cybersecurity in the Real Estate Industry: A Rapid7 Customer Story
Conducting cybersecurity in an industry not heavily regulated by the government still comes with its own challenges. We interviewed Tony...
Conducting cybersecurity in an industry not heavily regulated by the government still comes with its own challenges. We interviewed Tony...
A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting.WeaponsType Name DescriptionArmy-Knife/ALL BurpSuite the BurpSuite project...
A Password Spraying tool for Active Directory Credentials by Jacob Wilkin(Greenwolf)Getting StartedThese instructions will show you the requirements for and...
Our recent “Seeing 20/20 with InsightVM” customer webcast on InsightVM dashboards and executive summary report was very well-attended, and we...
Self-XSS attack using bit.ly to grab cookies tricking users into running malicious codeHow it works?Self-XSS is a social engineering attack...
A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.Contains...
The Verizon Data Breach Investigations Report (DBIR) has been released, reporting its annual summary of (this year) 32,002 incidents, 3,950...
On our third installment of Rapid7’s Remote Work Readiness Series, join us as we reflect on how to leverage partnerships...
Web Application Vulnerability Scanner.Spider DirectoriesFind Sub DomainAdvanced Dorks Search Scan list of Dorks Scan WebSites Reverse Ip Lookup Port ScanInstallation:git...
Sharingan is a recon multitool for offensive security / bug bountyThis is very much a work in progress and I'm...
We’re proud to announce that Rapid7’s InsightVM solution was recently reviewed by SC Magazine and received a five-star report. As...
Reverse Shell in Shortcut File (.lnk)How it works?Shortcut file (Microsoft Windows 9.x) LNK is a file extension for a shortcut...
A small library helping to parse commandline parameters (for Windows).Objectives"like Python's argparse but for C/C++"compact and minimalisticeasy to useextendableDemoPrint help...
Windows Crypter/Decrypter Generator with AES 256 bits keyFeatures:Works on WAN: Port Forwarding by Serveo.netFully Undetectable (FUD) -> Don't Upload to...
Reverse shell using Windows Registry file (.reg).Features:Reverse TCP Port Forwarding using Ngrok.ioRequirements:Ngrok Authtoken (for TCP Tunneling): Sign up at: https://ngrok.com/signupYour...
What is thisURLBrute is a tool to help you brute forcing website sub-domains and dirs.Can be used with python3 and...
FUD Android Payload And ListenerRead the license before using any part from this codeMalicious Android apk generator (Reverse Shell)Legal disclaimer:Usage...
Discord Remote Administration Tool fully written in Python3.This is a RAT controlled over Discord with over 20 post exploitation modules.Disclaimer:This...
Lockphish it's the first tool (05/13/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN...
Finder Of XSS, and Dal is the Korean pronunciation of moon. What is DalFoxJust, XSS Scanning and Parameter Analysis tool....
Take webcam shots from target just sending a malicious link.How it works?The tool generates a malicious HTTPS page using Serveo...
A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual...
I think we can all agree that when you are building workflows and setting up automation for your environment with...
We are incredibly excited to announce the second release of 2020, Kali Linux 2020.1.2A quick overview of what’s new since...