BEAR-C2 : Simulated Command And Control Framework For APT Attack Research

2 months ago

Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear…

Bearer – A Quick Guide To Scanning And Securing Your Application

2 months ago

Discover your application security risks and vulnerabilities in only a few minutes. In this guide you will install Bearer CLI,…

Waymore – A Comprehensive URL Retrieval And Archival Tool For Advanced Reconnaissance

2 months ago

The idea behind waymore is to find even more links from the Wayback Machine than other existing tools. The biggest…

Pycript – A Versatile Burp Suite Extension For Encryption And Decryption

2 months ago

The Pycript extension for Burp Suite is a valuable tool for penetration testing and security professionals. It enables easy encryption…

DependencyTrack 4.10.0 – Release Overview And Security Hashes

2 months ago

For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.If additional details are…

DependencyTrack 4.10.1 – Release Update And Verification Details

2 months ago

For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.If additional details are…

Dependency Track 4.11.0 – Enhancements, Bug Fixes, And Dependency Updates

2 months ago

For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.If additional details are…

DependencyTrack 4.11.1 – Bug Fixes, Security Improvements, And Changelog Highlights

2 months ago

For official releases, refer to Dependency Track Docs >> Changelogs for information about improvements and upgrade notes.If additional details are…

HikvisionExploiter – Automated Exploitation And Surveillance Utility For Hikvision Cameras

2 months ago

HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web…

RedFlag : AI-Powered Risk Assessment And Workflow Automation

2 months ago

RedFlag leverages AI to determine high-risk code changes. Run it in batch mode to scope manual security testing of release…