Legitify : Detect & Remediate Misconfigurations & Security Risks Across All Your GitHub Assets
Legitify is a tool to strengthen the security posture of your GitHub organization. Detect and remediate misconfigurations, security and compliance issues across all your GitHub assets with ease. Installation You can download the latest legitify release from https://github.com/Legit-Labs/legitify/releases, each archive contains: Legitify binary for the desired platform Built-in policies provided by Legit Security From source with the following steps: git clone git@github.com:Legit-Labs/legitify.git go run main.go analyze...
6 Benefits Of Using Open-Source Inventory Management Software For Your Business
The supply-demand ratio of a business is one of the most critical factors determining its effectiveness. Various companies are available, such as retail, manufacturing, wholesale, dealerships, distribution, and restaurants. Ensure you monitor your gadget inventory to keep up with demand. You need to assess how your inventory is planned - do you have all the essentials on hand? Is there...
Burp Suite Tutorial – A Web Application Penetration Testing Tool – Beginners Guide
In this Burp Suite Tutorial, we are going to elaborately describe the Burp Suite tool and its features that are bundled in a single suite made for Web Application Security assessment as well as Penetration testing. It's a java executable and hence it's cross-platform. Kali Linux comes with Burp Suite free edition installed. There is also a professional version...
Pyramid : A Tool To Help Operate In EDRs’ Blind Spots
Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose of the tool is to perform offensive tasks by leveraging some Python evasion properties and looking as a legit Python application usage. This can be achieved because: the Python Embeddable package provides a signed Python interpreter with good reputation; Python has...
Metasploit Framework – A Beginner’s Guide for Penetration Testing & Exploit Development
Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a collection of exploitation tools bundled into a single framework. It is available in all major Linux, Windows, OS X platforms. Its main objective is to test your/company's/organization's defenses by attacking them. Something like "Offense for Defense". This is actually where a...
AzureGraph : Azure AD Enumeration Over MS Graph
AzureGraph is an Azure AD information gathering tool over Microsoft Graph. Thanks to Microsoft Graph technology, it is possible to obtain all kinds of information from Azure AD, such as users, devices, applications, domains and much more. This application, allows you to query this data through the API in an easy and simple way through a PowerShell console. Additionally, you can...
Whatweb – A Scanning Tool to Find Security Vulnerabilities in Web App
Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information about a live website, like: Platform CMS platform Type of Script Google Analytics Web server Platform IP address, Country 900+ Plugins & their libraries used Server Headers, Cookies and a lot more. Whatweb offers both passive scanning and aggressive testing. Passive scanning just extracts...
SIEM – Security Information and Event Management Tools – A Beginner’s Guide
What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests, the primary function of a SIEM is Event management. The SIEM solution, once implemented completely & effectively, will have complete visibility over an organization’s network. This helps administrators and SIEM operators to monitor network activity in their infrastructure. But interestingly, one can categorize various assets(network...
R4Ven : Track IP And GPS Location
Track User's Smartphone/Pc Ip And Gps Location. The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows it, it will fetch the Gps location (latitude and longitude) of the target along with IP Address and Device Information. This tool is a Proof of Concept and is for Educational Purposes Only. Using this...
Klyda : Highly Configurable Script For Dictionary/Spray Attacks Against Online Web Applications
The Klyda project has been created to aid in quick credential based attacks against online web applications. Klyda supports the use from simple password sprays, to large multithreaded dictionary attacks. Klyda is a new project, and I am looking for any contributions. Any help is very appreciated.Klyda offers simple, easy to remember usage; however, still offers configurability for your needs: Mulithreaded...