NTLMRecon : Tool For Performing Light Brute-Forcing Of HTTP Servers

2 years ago

NTLMRecon is a tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints. NTLMRecon is…

Can Managed Service Providers Deal With Linux Machines?

2 years ago

When you're dealing with Linux-based systems, you might wonder if managed service providers (MSPs) can handle this unique challenge. You're…

Fuzztruction : Academic Prototype Of A Fuzzer

2 years ago

Fuzztruction is an academic prototype of a fuzzer that does not directly mutate inputs (as most fuzzers do) but instead…

FirebaseExploiter : Vulnerability Discovery Tool That Discovers Firebase Database Which Are Open And Can Be Exploitable

2 years ago

FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for…

Common Mistakes to Avoid When Trading in Cryptocurrency

2 years ago

Trading crypto is a popular way to make a living for many people worldwide. There are hundreds of digital assets…

Dedicated Devices and How your Organization Can Benefit From Them

2 years ago

Mobile devices for work have become prevalent in organizations of all sizes. Firms in finance, retail, healthcare, education, and other…

Bearer : Code Security Scanning Tool (SAST) That Discover, Filter And Prioritize Security Risks

2 years ago

Bearer is a Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks. Bearer CLI is…

hardCIDR : Linux Bash Script

2 years ago

hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script…

7 Risks & Challenges Dynamic Application Security Testing Solves

2 years ago

Web apps are the cat’s meow nowadays — every business, big or small, has one. Every company uses them, Whether…

PhoneSploit-Pro : An All-In-One Hacking Tool To Remotely Exploit Android Devices Using ADB And Metasploit-Framework To Get A Meterpreter Session

2 years ago

PhoneSploit with Metasploit Integration An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug…