RS256-2-HS256 – JWT Attack To Change The Algorithm RS256 To HS256
JWT Attack to change the algorithm RS256 to HS256Usageusage: RS256_2_HS256_JWT.py payload pubkeypositional arguments: payload JSON payload from JWT to attack...
JWT Attack to change the algorithm RS256 to HS256Usageusage: RS256_2_HS256_JWT.py payload pubkeypositional arguments: payload JSON payload from JWT to attack...
Here you will find privilege escalation tools for Windows and Linux/Unix* (in some near future also for Mac).These tools search...
pwndrop is a self-deployable file hosting service for sending out red teaming payloads or securely sharing your private files over...
DNSProbe is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice...
Crescendo is a swift based, real time event viewer for macOS. It utilizes Apple's Endpoint Security Framework.Getting StartedApple has introduced...
On this week’s episode of Security Nation, we had the pleasure of speaking with Stephanie Helm, director of the Massachusetts...
As of version 6.6.14 of Nexpose and InsightVM, the Scan Engine can now utilize Nmap service probes in addition to...
Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions.You can export...
crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks.Slides from ZeroNights 2019Demo 1 - X32-64, Edge,...
All of us here at Rapid7 hope that you and your families are safe and well during this unprecedented national...
In 2019, the number of new vulnerabilities published was more than double what we saw in 2016. 2020 is on...
This script is designed for use in situations where you do not have internet access on a Linux host and...
A domain name enumeration toolThe tools contained in domained requires Kali Linux (preferred) or Debian 7+ and Recon-ngdomained uses several...
Global working-from-home routines haven't slowed down Microsoft and its ability to help close up vulnerabilities in their products. This April...
Data exfiltration utility used for testing detection capabilities of security products. Obviously for legal purposes only.Exfiltration How-To/etc/shadow -> HTTP GET...
An open source image forensic toolset Introduction"Forensic Image Analysis is the application of image science and domain expertise to interpret...
As companies respond to COVID-19, many require their employees to work from home. This migration of the workforce places the...
Inhale is a malware analysis and classification tool that is capable of automating and scaling many static analysis operations.This is...
Privacy Badger is a browser extension that automatically learns to block invisible trackers. Instead of keeping lists of what to...
Audix will allow for the SIMPLE configuration of Windows Event Audit Policies. Window's Audit Policies are restricted by default. This...
Serverless Prey is a collection of serverless functions (FaaS), that, once launched to a cloud environment and invoked, establish a...
A lightweight native DLL mapping library that supports mapping directly from memoryFeaturesImports and delay imports are resolvedRelocations are performedImage sections...
Having a good technical understanding of the systems we land on during an engagement is a key condition for deciding...
A reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful...