Understanding the Principle of Least Privilege

4 years ago

With the number of high-profile and catastrophic cybersecurity breaches seeming to grow daily, it’s time for organizations of all sizes…

VAST : Visibility Across Space And Time

4 years ago

VAST is a tool for the network telemetry engine for data-driven security investigations. Key Features High-Throughput Ingestion: import numerous log…

Baserunner : A Tool For Exploring Firebase Datastores

4 years ago

Baserunner is atool for exploring and exploiting Firebase datastores. See this post on our blog for an overview of how Firebase works…

LibAFL : Advanced Fuzzing Library – Slot Your Fuzzer Together In Rust

4 years ago

Advanced Fuzzing Library is a slot your own fuzzers together and extend their features using Rust. LibAFL is written and…

WordPress Brute Force : Super Fast Login WordPress Brute Force

4 years ago

WordPress Brute Force is a super fast login for WordPress. .---. .-----------/ \ __ / ------/ / ( )/ -----//////…

Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

4 years ago

Priv2Admin idea is to "translate" Windows OS privileges to a path leading to: administrator,integrity and/or confidentiality threat,availability threat,just a mess.…

7 Ways in Which You Can Keep Yourself Safe on the Internet

4 years ago

It's easy to find ways to stay safe on the internet. With today's technology, you can stay connected with loved…

Kiterunner : Contextual Content Discovery Tool

4 years ago

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective…

Red-Detector : Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io

4 years ago

Red-Detector is a tool to Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance…

Evasor : A Tool To Be Used In Post Exploitation Phase For Blue

4 years ago

The Evasor is an automated security assessment tool which locates existing executables on the Windows operating system that can be…