Hacktory platform packed with new game-playing features
Without practice, theory is dead. Applied knowledge is essential in any area, especially in cybersecurity, and practice is the only...
Without practice, theory is dead. Applied knowledge is essential in any area, especially in cybersecurity, and practice is the only...
Today’s business world is increasingly driven by e-commerce and the cloud, which means it requires a proactive approach toward vulnerability...
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. GitHub Repo: https://github.com/accurics/terrascan...
OnionSearch is a Python3 script that scrapes urls on different ".onion" search engines. PrerequisitePython 3 Currently supported Search enginesahmia...
At Rapid7, we recognize that security professionals are facing a more challenging landscape than ever before. The mission of InsightIDR—our...
Blogpost: https://redteamer.tips/introducing-gg-aesy-a-stegocryptor/ WARNING: you might need to restore NuGet packages and restart visual studio before compiling. If anyone knows how...
(CVE-2018-13379) Exploitation Tool, You can use this tool to check the vulnerability in your FortiGate SSL-VPN. https://www.fortinet.com/blog/business-and-technology/fortios-ssl-vulnerability Usage v 0.6...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
Website Admin Panel FinderHow To Install (Linux/pc)sudo apt install python3 sudo apt install python3-pip sudo apt install git git clone...
Talon is a tool designed to perform automated password guessing attacks while remaining undetected. Talon can enumerate a list of...
webscan is a browser-based network IP scanner and local IP detector. It detects IPs bound to the user/victim by listening...
Tracee is a lightweight and easy to use container and system tracing tool. It allows you to observe system calls...
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple probers using retryabledns library, that allows you to...
Damn Vulnerable Bank Android Application aims to provide an interface for everyone to get a detailed understanding with internals and...
N1QLMap is an N1QL exploitation tool. Currently works with Couchbase database. The tool supports data extraction and performing SSRF attacks...
nginx Docker image secure by default. Avoid the hassle of following security best practices each time you need a web...
An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.InstallationRedShell runs...
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB"). The sandbox is used by Windows Defender...
Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to...
Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks....
OpenCRX version 4.30 and version 5.0-20200717 suffers from an unverified password change vulnerability, which is an instance of CWE-620. This...
ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to...
The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to...
The cloud remains a dominant technology innovation well into its second decade of existence. However, after all this time, certain...