Securing Web Applications in 2022: XDR, DAST, PTaaS & More by Gilad David Maayan
What is Web Application Security? Web application security involves protecting websites and web applications from security threats, most of which are caused by vulnerabilities in web application code...
View ArticleiKy - tool that collects information from an email and shows results in a...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Visit the Gitlab Page of the Project Video Demo Modules Installation...
View ArticleDDexec - a technique to run binaries filelessly and stealthily on Linux using...
Context In Linux in order to run a program it must exist as a file, it must be accessible in some way through the file system hierarchy (this is just how execve() works). This file may reside on disk...
View ArticleLupo - Malware IOC Extractor and Debugging module for Malware Analysis...
Introduction Working on security incidents that involve malware, we come across situations on a regular basis where we feel the need to automate parts of the analysis process as complete manual...
View ArticleDeep-Dive Analysis of Avos Locker Ransomware by Mila Bera
The days of silly malware that spewed annoying but ultimately harmless insults like that legendary “You are an idiot” trojan are behind us. Hackers are now going after the jugular, trying to strongarm...
View Article10+ Best Software for Coding by Jessica Bullet
So you want to learn how to code programs and software, but you don’t know where to start? Or maybe you already know the basics but are curious about all the different types of software that are out...
View ArticleSooty - The SOC Analysts all-in-one CLI tool to automate and speed up workflow
Sooty is a tool developed with the task of aiding SOC analysts with automating part of their workflow. One of the goals of Sooty is to perform as many of the routine checks as possible, allowing the...
View ArticleOsmedeus is a Workflow Engine for Offensive Security
What is Osmedeus? Osmedeus is a Workflow Engine for Offensive Security. It was designed to build a foundation with the capability and flexibility that allow you to automatically run your reconnaissance...
View ArticleMip22 An advanced phishing tool
The program is made for educational purposes only to see how the phishing method works. Any unnecessary use of the program is prohibited and the manufacturer has no responsibility for any illegal use...
View ArticleTest Socket | Build a Python Powered Hacking Framework | Hakin9
This video tutorial is the first step in developing a basic port scanner and adding features. It is a part of our online course Build a Python Powered Hacking Framework by Atlas Stark. Dive in!
View ArticleBeast Bomber - SMS bomber, email spammer, WhatsApp spammer, Telegram spammer,...
Beast Bomber in Telegram: https://t.me/beast_bomberr_bot (in development) Beast Bomber in GitLab: https://gitlab.com/ebankoff/Beast_Bomber See also: https://github.com/ebankoff/CleanerPRO Possibilities...
View ArticlePyPhisher - Easy to use phishing tool with 65 website templates
PyPhiser is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail, and many others. Installation Install primary dependencies (git and...
View ArticleBlind XSS in Practice | Advanced Bug Hunting with Burp Suite Tutorial [FREE...
In this video tutorial from our online course Advanced Bug Hunting with Burp Suite, our instructor Dhruv Kandpal will show you how to detect blind XSS vulnerabilities with help of XSS Hunter! Dive in!
View ArticleNIPE - An engine to make Tor Network your default gateway
The Tor project allows users to surf the Internet, chat, and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for...
View Articlesocialhunter - crawls the website and finds broken social media links that...
Crawls the given URL and finds broken social media links that can be hijacked. Broken social links may allow an attacker to conduct phishing attacks. It also can cost a loss of the company's...
View ArticleHow to Scale Your OSINT Research with Data Enrichment by Gergo Varga
Open source intelligence provides a rich treasure-trove of freely available data. It’s possible to tap into it with nothing more than a web browser and a search engine. A data point such as an email...
View ArticleVAmPI - Vulnerable REST API with OWASP top 10 vulnerabilities for security...
VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from the OWASP top 10 vulnerabilities for APIs. It was created as I wanted a vulnerable API to evaluate the efficiency of tools...
View ArticleAdalanche: Active Directory ACL Visualizer and Explorer
Adalanche gives instant results, showing you what permissions users and groups have in an Active Directory. It is useful for visualizing and exploring who can take over accounts, machines, or the...
View ArticleAWS Lambda for Go
Libraries, samples, and tools to help Go developers develop AWS Lambda functions. To learn more about writing AWS Lambda functions in Go, go to the official documentation Getting Started // main.go...
View ArticleWEF - WiFi Exploitation Framework
A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, Bluetooth hacking, and much more. I recommend you my alfa...
View Article