What You Need To Know About the World’s First Cybersecurity Experience (CSX) Platform: Perimeter 81

0

Zero trust networking leader Perimeter 81 has announced its creation of the world’s first Cybersecurity Experience (CSX) Platform, thus becoming the first company to exist in a whole new category of cybersecurity tools. Perimeter 81 saw a desperate need in the modern enterprise cybersecurity market for a single source for streamlined Secure Access Service Edge (SASE) to merge dozens of...

The Ultimate Guide to Web Testing: Types and Key Areas

0

This guide is a web security testing bible that will help you with web safety. It includes a number of different web security testing strategies and types of web security testing. You'll learn how to test for vulnerabilities in your website, what the web looks like from an attacker's perspective, and what you can do to make sure your...

FakeDataGen : Full Valid Fake Data Generator

0

FakeDataGen is a Full Valid Fake Data Generator. This tool helps you to create fake accounts (in Spanish format) with fully valid data. Within this information, you can find the most common names, emails, bank details and other useful information. Requirements Python 3Install requirements.txt Download It is recommended to clone the complete repository or download the zip file. You can do this by...

The Definitive Guide to Web Security Testing: Vulnerabilities and Password Management

0

Many web developers often neglect web security testing. However, it is a crucial part of the web development process because web security testing can identify vulnerabilities that may be missed during other stages. Once these web security holes are identified, they can be patched up and avoided from being exploited by hackers. In this guide, we will cover what...

ELFXtract : An Automated Analysis Tool Used For Enumerating ELF Binaries

0

ELFXtract is an automated analysis tool used for enumerating ELF binaries. Powered by Radare2 and r2ghidra This is specially developed for PWN challenges and it has many automated features It almost displays every details of the ELF and also decompiles its ASM to C code using r2ghidra Decompiling ELFs in Ghidra takes more time, but in elfxtract it decompiles and displays in...

Nanobrok : Web Service For Control And Protect Your Android Device Remotely

0

Nanobrok-Server is powerful opensource webservice for control and protect your android device, written in Python, that allow and offer a stable and security connection with your android device for protect , control remotely. Main Features Maps the location of your deviceAlert flag (Event it's lost or stolen)Recorder Audio MicRemote File Transfer Network scanner and more! Security Features We implemented some security features for...

LOLBins : PyQT5 App For LOLBAS And GTFOBins

0

PyQT app to list all Living Off The Land Binaries and Scripts for Windows from LOLBAS and Unix binaries that can be used to bypass local security restrictions in misconfigured systems from GTFOBins. Download

goEnumBruteSpray : User Enumeration And Password Bruteforce On Azure, ADFS, OWA, O365 And Gather Emails On Linkedin

0

goEnumBruteSpray is recommended module is o365 for user enumeration and passwords bruteforce / spray . Additional information can be retrieved to avoid account lockout, to know that the password is good but expired, MFA enabled,... Linkedin This module should be used to retrieve a list of email addresses before validating them through a user enumeration module. The company will be searched...

Redherd Framework : A Collaborative And Serverless Framework

0

RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of conducting simulating complex offensive cyberspace operations. Getting Started Take a look at the RedHerd documentation for instructions on how to getting started with the framework. Changelog Go to CHANGELOG to see all the version changes. Disclaimer The provided contents and tools are for awareness and research purposes only....

Whoc : A Container Image That Extracts The Underlying Container Runtime

0

Whoc is a container image that extracts the underlying container runtime and sends it to a remote server. Poke at the underlying container runtime of your favorite CSP container platform! How does it work? As shown by runc CVE-2019-5736, traditional Linux container runtimes expose themselves to the containers they're running through /proc/self/exe. whoc uses this link to read the container runtime...