Kubernetes Namespaces Are Not as Secure as You Think
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down...
The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community...
Our fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies...
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts,...
Today, Rapid7 just released the first in our all-new Industry Cyber-Exposure Report (ICER) series. For those of you who have...
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection...
The Commissioner Jules Maigret is a fictional French police detective, created by Georges Simenon. His investigation method is based on...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
Log data is critical to ensuring that you have full visibility into what’s going on across your environment. Alongside endpoint...
2021 is off and running! The big question on the corporate world’s mind is, of course, “What will work life...
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.Supported VersionsWindows 10 1507,...
Get SharpHoundThe latest build of SharpHound will always be in the BloodHound repository here Compile InstructionsSharpHound is written using C#...
Quick tool to help make evasion work a little bit easier. Takes a binary as input and splits it until...
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights...
This repository is the reference implementation of The Update Framework (TUF). It is written in Python and intended to conform...
Deepfence SecretScanner can find any potential secrets in container images or file systems. What are Secrets?Secrets are any kind of...
SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi's Mimikatz project.I did not come up with this logic,...
Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and...