Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…
In this Burp Suite Tutorial, we are going to elaborately describe the Burp Suite tool and its features that are…
Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a…
Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify…
Running a tech company can leave you with a lot of clutter. Trailing wires, old devices, paperwork, and filing cabinets…
SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter…
Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in…
Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…
Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used…
Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can…