Are You Still Running End-of-Life Windows Servers?
Windows Server 2008 and 2008 R2 reached their end of life (EOL) on Jan. 14, 2020. What does that mean...
Windows Server 2008 and 2008 R2 reached their end of life (EOL) on Jan. 14, 2020. What does that mean...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
RmiTaste allows security professionals to detect, enumerate, interact and attack RMI services by calling remote methods with gadgets from ysoserial....
Takeover AWS ips and have a working POC for Subdomain Takeover. Idea is simple Get subdomains. Do reverse lookups to...
How it works?1- Build server 2- Connect with admin and client to server 3- To collect information, send the request...
TheCl0n3r will allow you to download and manage your git repositories. PrefaceAbout 90% of the penetration testing tools used in...
Project Eagle is a plugin based vulnerabilities scanner with threading support used for detection of low-hanging bugs on mass scale...
hack-browser-data is an open-source tool that could help you decrypt data (passwords / bookmarks / cookies / history) from the...
Mail Swipe is a python script that helps you to create temporary email addresses and receive emails at that address....
Zracker is a Zip File Password BruteForcing Utility Tool based on CPU-Power. Yet available for Linux only ... Supports WordList...
Let’s talk about false positives. They’re frustrating and faulty, but also about as certain as death and taxes for anyone...
Rapid7 detection and response customers have access to, and insights from, our experts and research driving the industry forward. This...
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4 This is reworked original Mikrotik Exploit. Added Python 2 compatibility...
"MEDUZA" ("медуза") means "jellyfish" in Ukrainian What is MEDUZA?It's a Frida-based tool, my replacement for SSLKillSwitch. I created it for...
Managing security for the largest Dental Support Organization (DSO) in the United States is no easy task. And sometimes, you...
by Bob Rudis If you’re in the U.S. and were waiting for an “October surprise”, look no further than CVE-2020-16898...
Nuubi Tools: Information-ghatering|Scanner|Recon Options: -h/--help | Show help message and exitArguments: -b/--banner | Banner grabing of target ip address -s/--subnet...
Why?If you try to learn a little bit more about crypto, either because you want to know how the attacks...
Microsoft brings us an October's Update Tuesday with 87 vulnerabilities, a sub-100 number we haven't experienced in quite some time....
This is the second installment of our series around 2021 security planning. In part one, Rapid7 Detection and Response Practice...
Attacks on WiFi networks are well known in the cybersecurity world, as an established technique for penetrating a target. The Hak5 WiFi...
Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover, or office.com login page.Usageo365enum will read usernames from the file provided...
A proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the browser....
In July, we provided a rundown of what was new in InsightIDR, our cloud-based SIEM tool, from the first half...