How to Secure Containers, Applications, and Serverless Environments
This is the final post in our four-part series on security in the cloud. In part one, we discussed the...
This is the final post in our four-part series on security in the cloud. In part one, we discussed the...
Note that the tool is still under development. Things may break anytime - hence, beta!A fast and flexible NTLM reconnaissance...
HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides...
Today there are many ways to create a reverse shell in order to be able to remotely control a machine...
Entropy Toolkit is a set of tools to exploit Netwave and GoAhead IP Webcams. Entropy is a powerful toolkit for...
To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release...
Ghost Framework is an Android post exploitation framework that uses anAndroid Debug Bridge to remotely access an Android device. Ghost...
This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker...
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is...
This post describes CVE-2019-5648, a vulnerability in the Barracuda Load Balancer ADC. A malicious actor who gains authenticated, administrative access...
This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...
Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...
About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...
All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...
WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This...
If you joined Rapid7 at RSAC 2020 just a few days ago, you probably caught wind of Rapid7’s end-of-year threat...
DNS Rebinding freamwork containing:a dns server obviouslyweb api to create new subdomains and control the dns server, view logs, stuff...
BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the...
This blog was co-authored by Mark Hamill and Bob Rudis.There’s nothing quite like attending the annual RSA security conference in...
Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it...
subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a...
This tool search for SSRF using predefined settings in different parts of a request (path, host, headers, post and get...
The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the...
PolyShell is a script that's simultaneously valid in Bash, Windows Batch, and PowerShell (i.e. a polyglot).This makes PolyShell a useful...