Automating Application Security Testing Within Your Atlassian Bamboo Pipelines
This blog post is part three of our ongoing Automation with InsightAppSec series. Make sure to check out part one...
This blog post is part three of our ongoing Automation with InsightAppSec series. Make sure to check out part one...
Nginx Log Security Analysis ScriptFeaturesStatistics Top 20 AddressSQL injection analysisScanner alert analysisExploit detectionSensitive path accessFile contains attackWebshellFind URLs with response...
EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence).EXIST is written by the following software.Python 3.5.4Django...
Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and...
This CyberRange project represents the first open-source Cyber Range blueprint in the world.This project provides a bootstrap framework for a...
Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and...
This has only been tested on Kali.It depends on the msfrpc module for Python, described in detail here: https://www.trustwave.com/Resources/SpiderLabs-Blog/Scripting-Metasploit-using-MSGRPC/Install the...
Powershell Express Delivery The web_delivery module is often used to deliver a payload during post exploitation by quickly firing up...
Some of the most common web application vulnerabilities tend to be the most exploited because they are difficult to spot,...
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of...
hashcobra Hash Cracking tool.Usage$ ./hashcobra -H--====--usage: hashcobra -o <opr> | options: -a <alg> - hashing algorithm - ? to list...
The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a...
It’s no secret that as the security landscape becomes increasingly complex, resources are becoming harder and harder to find. Team...
Executive summary As part of a recent IoT hacking training exercise, a number of Rapid7 penetration testers set out to...
Today we come to the end of 2019's monthly Microsoft Patch Tuesday (also known as Update Tuesday). This Christmas, Microsoft...
What is a vulnerability risk management program? A vulnerability risk management program is imperative at any organization to secure assets,...
At Rapid7 Labs we are always on the look for new research topics and fields to stick our fingers in...
A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values,...
This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular...
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with...
Charging stations for electric cars have sprung up across the country in recent years as hybrid vehicles continue to gain...
E-commerce websites continue to be targeted by online criminals looking to steal personal and payment information directly from unaware shoppers....
GitHub revealed on Tuesday that last year it paid out $165,000 to researchers who took part in its public bug...
Cobalt Strike is software for Adversary Simulations and Red Team Operations. What this means is, if you wanted to test your...