NTLMRecon is a tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints. NTLMRecon is…
When you're dealing with Linux-based systems, you might wonder if managed service providers (MSPs) can handle this unique challenge. You're…
Fuzztruction is an academic prototype of a fuzzer that does not directly mutate inputs (as most fuzzers do) but instead…
FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for…
Trading crypto is a popular way to make a living for many people worldwide. There are hundreds of digital assets…
Mobile devices for work have become prevalent in organizations of all sizes. Firms in finance, retail, healthcare, education, and other…
Bearer is a Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks. Bearer CLI is…
hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script…
Web apps are the cat’s meow nowadays — every business, big or small, has one. Every company uses them, Whether…
PhoneSploit with Metasploit Integration An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug…