Grouper2 – Find Vulnerabilities In AD Group Policy
What is it for?Grouper2 is a tool for pentesters to help find security-related misconfigurations in Active Directory Group Policy.It might...
What is it for?Grouper2 is a tool for pentesters to help find security-related misconfigurations in Active Directory Group Policy.It might...
Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily...
Aaia (pronounced as shown here ) helps in visualizing AWS IAM and Organizations in a graph format with help of...
Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL.Scallion runs on Mono (tested...
Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup...
Framework to test any Anti-Cheat on the market. This can be used as Template or Code Base to test any...
gowitness is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using...
On Dec. 17, 2019, a directory traversal vulnerability was announced in the Citrix Application Discovery Controller and Citrix Gateway, which...
Python library to remotely extract credentials. This blog post explains how it works.You can check the wikiThis library uses impacket...
LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and...
What is the CryptoAPI Spoofing Vulnerability? Who is impacted?A flaw (CVE-2020-0601) has recently been found in the way the Microsoft...
Nowadays, it’s easier than ever to create an app that allows customers to interact with your brand. If your app...
What is a shell backdoor ?A backdoor shell is a malicious piece of code (e.g. PHP, Python, Ruby) that can...
hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It...
Metasploit’s community CTF is back by popular demand. Starting January 30, put your skills to the test for a chance...
This is a standalone script written in Python 3 for GTFOBins. You can search for Unix binaries that can be...
SWFPFinder is a simple and open source bash script designed to discovery the potential swf (file) parameters on the webapp...
The first Patch Tuesday of 2020 has been hotly anticipated due to a rumour that Microsoft would be fixing a...
This is a guest post by Rapid7 customer Steven Maske, the Information Security Manager of a manufacturing, retail, and distribution...
Incorrect configuration allows you to access .env files or reading env variables. LaravelN00b automated scan .env files and checking debug...
Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition...
Security professionals responsible for vulnerability risk management are required to perform data querying and analysis on a regular basis to...
Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has...
HeapInspect is designed to make heap much more prettier.Now this tool is a plugin of nadbg. Try it!FeaturesFree of gdb...