New WordPress Vulnerability Hijacks Site Visitors

2 years ago

Researchers have found an exploit within almost a dozen WordPress plugins that aim to hijack the user experience and send…

Security Cameras: Bridging The Gap Between Physical And Digital Cybersecurity

2 years ago

Physical and digital security are crucial to one another. Your digital resources are only as secure as your physical premises,…

ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

2 years ago

ExchangeFinder is a simple and open-source tool that tries to find Micrsoft Exchange instance for a given domain based on…

Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

2 years ago

Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other…

PXEThief : Extract Passwords From The Operating System Deployment Functionality

2 years ago

PXEThief is a set of tooling that implements attack paths discussed at the DEF CON 30 talk Pulling Passwords out…

Cypherhound : Terminal Application That Contains 260+ Neo4j Cyphers For BloodHound Data Sets

2 years ago

Cypherhound a Python3 terminal application that contains 260+ Neo4j cyphers for BloodHound data sets. Why? BloodHound is a staple tool…

Subparse : Modular Malware Analysis Artifact Collection And Correlation Framework

2 years ago

Subparse, is a modular framework developed by Josh Strochein, Aaron Baker, and Odin Bernstein. The framework is designed to parse…

AzureHound : Azure Data Exporter For BloodHound

2 years ago

AzureHound is a bloodHound data collector for Microsoft Azure. Get AzureHound Release Binaries Download the appropriate binary for your platform…

Xerror – An Automated Penetration Testing Tool With GUI

2 years ago

Xerror is an automated pentesting tool, which helps security professionals and nonprofessionals to automate their pentesting tasks. It will perform…

Mongoaudit – An Audit and Pentesting Tool for MongoDB Databases

2 years ago

Databases typically store sensitive data or data that is important for the company. Mongoaudit helps to audit several technical aspects…