Patch Tuesday – February 2020
A relatively modest 99-vulnerability February Patch Tuesday has arrived with a fix for the Internet Explorer 0-day CVE-2020-0674 (originally ADV200001)...
A relatively modest 99-vulnerability February Patch Tuesday has arrived with a fix for the Internet Explorer 0-day CVE-2020-0674 (originally ADV200001)...
Data aggregated from these three core security realms can give the SOC an overall view of the most critical activity...
The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled...
Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm...
Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly-optimized monitoring agent you install...
A vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity.Setup for a physical...
FockCache - Minimalized Test Cache PoisoningDetail For Cache Poisoning : https://portswigger.net/research/practical-web-cache-poisoningFockCacheFockCache tries to make cache poisoning by trying X-Forwarded-Host and...
Acunetix, the pioneer in automated web application security software, has announced the release of Acunetix Version 13. The new release...
Search engine scraper tool with BASH script.Dependencycurl (cli)Available search engineAsk.comSearch.yahoo.comBing.comInstallationgit clone https://github.com/zerobyte-id/SEcraper.gitcd SEcraper/Runbash secraper.bash "QUERY"Download SEcraper Original Source
Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using Re2Pcap and test them against...
Note: There are five different CVEs associated with the CDPwn vulnerability group. Each of them targets a different class of...
Sub-domain takeover vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed...
A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can...
On the Rapid7 Labs team, we’re constantly looking for ways to give defenders a boost in the work they need...
Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled...
Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally...
In part one of our four-part series on security in the cloud, we discussed the AWS shared responsibility model and...
Qiling is an advanced binary emulation framework, with the following features:Cross platform: Windows, MacOS, Linux, BSDCross architecture: X86, X86_64, Arm,...
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline...
That’s good news, right? Well, I’d say that’s a qualified “yes.” As I mentioned, it’s easy to change the implant...
In this sequel, wvu recounts the R&D (in all its imperfect glory) behind creating a Metasploit module for the DOUBLEPULSAR...
WhatTheHack is a collection of challenge based hack-a-thons including student guide, proctor guide, lecture presentations, sample/instructional code and templates.What, Why...
Simple python tool that goes through a list of URLs trying CRLF and open redirect payloads. ▪ ▐ ▄ ▐▄▄▄▄▄▄...
After four days of competition and a whole lot of “trying harder,” we have the winners of this year's Metasploit...