R7-2019-40: Bloomsky SKY2 Weather Camera Station Data Authenticity and Exposure Vulnerabilities
A number of information leak vulnerabilities are present in the Bloomsky SKY2 network, obtainable via JSON queries intended to work...
A number of information leak vulnerabilities are present in the Bloomsky SKY2 network, obtainable via JSON queries intended to work...
We are incredibly excited to announce the first release of 2020, Kali Linux 2020.1.2020.1 includes some exciting new updates:Non-Root by...
Pythonic way to load shellcode. Builds an EXE for you too!UsagePlace a payload.bin raw shellcode file in the same directory....
Microsoft Application Inspector is a software source code analysis tool that helps identify and surface well-known features and other interesting...
In light of recent activity on US trade agreements, here is a quick update on developments with regard to US-China,...
This tool is intended for penetration testers who want to perform an engagement quickly and efficiently. While this tool can...
Smart OSINT collection of common IOC types.OverviewThis application is designed to assist security analysts and researchers with the collection and...
InsightIDR’s Log Search interface allows you to easily query and visualize your log data from within the product, but sometimes...
socialscan offers accurate and fast checks for email address and username usage on online platforms.Given an email address or username,...
Aircrack-ng is a complete suite of tools to assess WiFi network security.It focuses on different areas of WiFi security:Monitoring: Packet...
Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and...
Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However,...
Simple TCP reverse shell written in Go.It uses TLS to secure the communications, and provide a certificate public key fingerprint...
Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password...
C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB...
I always had an interest in reverse engineering. A few days ago I wanted to look at some game internals...
In any IT environment, documentation of work performed by IT is critical and necessary to maintain order when providing resolutions...
SAFE is a tool developed to create Binary Functions Embedding developed by Massarelli L., Di Luna G.A., Petroni F., Querzoni...
AlertResponder is a serverless framework for automatic response of security alert.OverviewAlertResponder receives an alert that is event of interest from...
If you’re operating in the cloud, you may be familiar with the shared responsibility model. We often hear people say...
A tiny framework for easily manipulate the tty and create fake binaries.How it works?The framework has three main functions, tas_execv,...
Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.RequirementsCorsy only works with Python 3 and...
If you feel anxious about the amount of time it takes your organization to remediate vulnerabilities or find yourself spending...
Telegram Group Scraper Tool. Fetch All Information About Group Members• How To Install & Setup API ( Termux )• API...