ReconPal : Leveraging NLP For Infosec
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs to know about the right tools, correct queries/syntax, run those queries, correlate the information, and sanitize the output. All of this might be easy for a seasoned infosec/recon professional to do, but for rest, it...
Top IP Management Softwares in 2022
Businesses have been getting more and more digitalized. This is great, but rapid digitization has made it difficult for businesses to track, manage, and retain big databases of devices and networks. Especially small businesses still struggle with a lack of accessible and trustworthy IP address management technology. There have been great developments in that area lately and we now have...
Pros & Cons Of Incorporating Cybersecurity Into SEO Strategy
As the internet continues to grow, so does the threat of cybercrime. We all know that the internet is full of sensitive information and a lot of people are getting hacked and identities were stolen. In order to protect yourself, it’s important to optimize your website for search engines, which also includes incorporating SEO security. There are some benefits...
System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware
System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. System requirements Windows 7 or higher, 32-bit or 64-bit. Features A detailed overview of system activity with highlighting.Graphs and statistics allow you quickly to track down resource hogs and runaway processes.Can't edit or delete a file?...
dBmonster : Track WiFi Devices With Their Recieved Signal Strength
dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their sent packets (sniffed with TShark). These dBm values will be plotted to a graph with matplotlib. It can help you to identify the exact location of nearby WiFi devices (use a directional WiFi antenna for the best results) or to find out how...
Concealed_Code_Execution : Tools And Technical Write-Ups Describing Attacking Techniques
Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here you will find explanations of how these techniques work, receive advice on detection, and get sample source code for testing your detection coverage. Content This repository covers two classes of attacking techniques that extensively use internal Windows mechanisms plus provides suggestions...
RPCMon : RPC Monitor Tool Based On Event Tracing For Windows
RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like Procmon for easy usage, and uses James Forshaw .NET library for RPC. RPCMon can show you the RPC functions being called, the process who called them, and other relevant information.RPCMon uses a hardcoded RPC dictionary for fast RPC information...
crAPI : Completely Ridiculous API
crAPI (completely ridiculous API) will help you to understand the ten most critical API security risks. crAPI is vulnerable by design, but you'll be able to safely run it to educate/train yourself. crAPI is modern, built on top of a microservices architecture. When time has come to buy your first car, sign up for an account and start your journey. To know...
dnsReaper : Subdomain Takeover Tool For Attackers, Bug Bounty Hunters And The Blue Team!
DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures in our arsenal! We can scan around 50 subdomains per second, testing each one with over 50 takeover signatures. This means most organisations can scan their entire DNS estate in less than 10 seconds. You can use DNS Reaper as an...
Ropr : A Blazing Fast Multithreaded ROP Gadget Finder. Ropper / Ropgadget Alternative
ROP (Return Oriented Programming) Gadgets are small snippets of a few assembly instructions typically ending in a ret instruction which already exist as executable code within each binary or library. These gadgets may be used for binary exploitation and to subvert vulnerable executables. When the addresses of many ROP Gadgets are written into a buffer we have formed a ROP Chain. If...