Wireshark 4.0.8 Release: What’s New!
Wireshark released the latest release note for 4.0.8 on its official page regarding bug fixes that have been detected earlier and updated protocol support. A network protocol analyzer, Wireshark captures packets from a network connection, providing insightful network analysis. The end of support for 32-bit Windows files has been planned for Wireshark 4.0 and later. For those who need to use Wireshark...
Kali Linux 2023.3 Released – What’s New!
Kali Linux 2023.3 Released along with many tools and feature updates which can be useful for security researchers, penetration testers, bug bounty hunters and many other security personnels. To highlight a few major changes from the previous release, there is a major stack change or Internal infrastructure to be precise. Additionally, Kali purple has been included with a new “Autopilot”...
Vajra – Your Weapon To Cloud
About Vajra Vajra is a tool with a graphical user interface that can be used to attack and look around in the Azure environment of a target. In Indian folklore, Vajra is the name of the weapon of the god of thunder and storms, Indra. Because it works with the cloud, it's a great name for the tool. Vajra currently works with...
WELA (Windows Event Log Analyzer)
Windows Event Log Analyzer wants to be the Swiss Army knife of Windows event logs. At the moment, WELA's best feature is that it can make an easy-to-understand timeline of logins to help with fast forensics and incident reaction. WELA's logon timeline generator will combine only the useful information from multiple logon log entries (4624, 4634, 4647, 4672, 4776)...
PersistenceSniper – A PowerShell Tool For Blue Teams, Incident Responders & System Admin
PersistenceSniper is a Powershell tool that Blue Teams, Incident Responders, and System Administrators can use to find persistent threats on Windows machines.
Domain-Protect : OWASP Domain Protect
Domain-Protect is an OWASP Domain Protect - prevent subdomain takeover. Prevent subdomain takeover ... ... with serverless cloud infrastructure OWASP Global AppSec Dublin - talk and demo Features scan Amazon Route53 across an AWS Organization for domain records vulnerable to takeover scan Cloudflare for vulnerable DNS records take over vulnerable subdomains yourself before attackers and bug bounty researchers automatically create known issues in Bugcrowd or HackerOne vulnerable domains...
Metlo : An Open-Source API Security Platform
Metlo is an open-source API security platform. Metlo is an open source API security tool you can setup in < 15 minutes that inventories your endpoints, detects bad actors and blocks malicious traffic in real time. Detect API attacks in real time. Automatically block malicious actors. Create an Inventory of all your API Endpoints and Sensitive Data. Proactively test your APIs before they go...
Hackingtool – All in One Hacking tool For Hacker
A hacking tool is a piece of software that can be used for different things in cybersecurity and vulnerability testing. These tools help security workers find weaknesses, test security measures, and figure out how strong networks, apps, and systems are. They can be used both offensively and defensively, which helps improve cybersecurity methods as a whole. Anonymously Hiding Tools Anonmously Surf Multitor Information...
Bryobio – NETWORK Pcap File Analysis For SOC Analysts
When you look at a network PCAP (Packet Capture) file, you look at the network traffic data that was recorded during a certain time period. Tools that record packets, such as Wireshark, tcpdump, and tshark, often make PCAP files. These files have raw network packet data, like headers and payloads, that can help with problems, security, and other things....
Nimbo-C2 : Lightweight C2 Framework
Nimbo-C2 is yet another (simple and lightweight) C2 framework. Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and...