Citizen Science and Medical Consumerism: Confronting the Tech Wisdom Gap in Modern Healthcare
In our latest episode of Security Nation, we spoke with Nina Alli, executive director of the Biohacking Village, to discuss...
In our latest episode of Security Nation, we spoke with Nina Alli, executive director of the Biohacking Village, to discuss...
Rapid7 joined a brief to the US Supreme Court on the chilling effect of the overbroad Computer Fraud and Abuse...
A free and portable tool for controlling Windows 10's many privacy-related settings and keep your personal data private.Your preparation for...
Santa is a binary whitelisting/blacklisting system for macOS. It consists of a kernel extension (or a system extension on macOS...
FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSS vulnerability in a fast...
ParamSpider : Parameter miner for humans.Key Features : Finds parameters from web archives of the entered domain. Finds parameters from...
Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations....
The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual stage VBS infection...
Mail transfer is a common search query. Most commonly, users may migrate due to personal preferences, corporate policies, or support...
Super Simple Python Word List Generator for Password Cracking (Hashcat)!I know what your are thinking. Why create another word list...
A typical search engine dork scanner that scrapes search engines with queries that you provide in order to find vulnerable...
While the COVID-19 pandemic has made online stores increasingly valuable, some small businesses may not have had the experience around...
Hardened Debian GNU/Linux and CentOS 8 distro auditing.The main test environment is in debian GNU/Linux 9/10 and CentOS 8, and...
Shhgit finds secrets and sensitive files across GitHub code and Gists committed in near real time by listening to the...
In our modern threat landscape, many organizations face challenges that remain difficult to decipher, let alone resolve. In a fast-paced...
ScanT3r - Web Security Scanner _____ ___________ / ___/_________ _____/_ __/__ /_____ __ / ___/ __ `/ __ / /...
Airshare is a Python-based CLI tool and module that lets you transfer data between two machines in a local network,...
The latest Verizon Data Breach Investigations Report (DBIR) was released in May, and we’re still unpacking all the golden nuggets...
Git All the Payloads! A collection of web attack payloads. Pull requests are welcome!Usagerun ./get.sh to download external payloads and...
A Proof-of-Concept bind shell using the Fax service and a DLL hijack based on Ualapi.dll.See our writeup at: https://windows-internals.com/faxing-your-way-to-system/How to...
The mission of InsightIDR, Rapid7’s natively cloud SIEM, is a simple one: eliminate the complexity that stands between talented security...
In a recent alert published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the organization laid out the 12...
Cloud Configuration Assessment is an InsightVM feature that provides a security-focused view into your cloud environment. Capabilities are centered around...
Converts an EXE, so that it can be loaded like a DLL.Supports both 32 and 64 bit DLLsInspired by the...