Dnxfirewall – A Pure Python Next Generation Firewall Built On Top Of Linux Kernel/Netfilter
DNX Firewall is an optimized/high performance collection of applications or services to convert a standard linux system into a zone...
DNX Firewall is an optimized/high performance collection of applications or services to convert a standard linux system into a zone...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
FLUFFI - A distributed evolutionary binary fuzzer for pentesters. About the project High level overview Getting started Usage HOWTOs Technical...
GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.0. The main idea...
It’s hard to believe it’s already the end of September, and with it comes Rapid7’s Q2 2020 Quarterly Threat Report....
A dynamic VMP dumper and import fixer, powered by VTIL. Works for VMProtect 3.X x64. Before vs After UsageVMPDump.exe <Target PID>...
What IS Moriarty?Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the...
Data is essential to any SIEM. Generally, this data is collected from logs, endpoints, and networks. All of this data...
A Fast Reverse Proxy To Help You Expose A Local Server Behind A NAT Or Firewall To The Internet.Development Statusfrp...
A fast tool to scan CRLF vulnerability written in Go Installationfrom BinaryThe installation is easy. You can download a prebuilt...
Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were...
Scan only once by IP address and reduce scan times with Nmap for large amounts of data. Unimap is an...
A Blind XSS Injector tool FeaturesInject Blind XSS payloads into custom headers Inject Blind XSS payloads into parameters Uses Different...
CRLFMap is a tool to find HTTP Splitting vulnerabilitiesWhy?I wanted to write a tool in Golang for concurrency I wanted...
A Payload Injector for bugbounties written in go FeaturesInject multiple payloads into all parameters Inject single payloads into all parameters...
Pipe different tools with google dork Scanner Installzoid@MSI ~/dorkX> git clone https://github.com/ethicalhackingplayground/dorkX zoid@MSI ~/dorkX> cd dorkX zoid@MSI ~/dorkX> go build...
On Tuesday September 15th, the US House unanimously passed the IoT Cybersecurity Improvement Act . The bill, sponsored by Reps....
Let’s talk about the reality of the remediation process today. We know it is often a cumbersome and time-consuming process,...
Utility to find AES keys in running process memory. Works for 128, 192 and 256-bit keys. UsageOpen aes-finder.sln solution in...
croc is a tool that allows any two computers to simply and securely transfer files and folders. AFAIK, croc is...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
ADE - ActiveDirectoryEnumusage: activeDirectoryEnum dc ___ __ _ ____ _ __ ______ / | _____/ /_(_) _____ / __ (_)_______...
Abusing Kerberos Resource-Based Constrained DelegationTL;DRThis repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows Active...
Earlier this year, Rapid7 and Snyk partnered together with the goal of securing cloud-native apps across the software development lifecycle...