cybersecurity

Coustom Bash – A Tool To Automate Penetration Testing Tasks

Custom bash scripts have emerged as powerful tools for automating a range of penetration testing tasks, from reconnaissance to payload…

2 years ago

EDRSandblast-GodFault: Advanced EDR Bypass Tool

EDRSandblast-GodFault is an advanced EDR bypass tool aimed at security researchers and organizations. Its purpose is to evaluate the effectiveness…

2 years ago

CVE-2023-38035 – Arbitrary Command Execution As The Root user On Ivanti Sentry

Ivanti has just put out a warning about CVE-2023-38035. The vulnerability has been added to CISA KEV and is called…

2 years ago

AD_Enumeration_Hunt – AD Pentesting Toolkit

Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be…

2 years ago

Wireshark 4.0.8 Release: What’s New!

Wireshark released the latest release note for 4.0.8 on its official page regarding bug fixes that have been detected earlier…

2 years ago

Vajra – Your Weapon To Cloud

About Vajra Vajra is a tool with a graphical user interface that can be used to attack and look around…

2 years ago

How to Use Ettercap to Intercept and Sniff Passwords

For man-in-the-middle attacks, Ettercap is a complete suite. It includes live connection sniffing, real-time content filtering, and other intriguing techniques.…

2 years ago

RedditC2 : Abusing Reddit API To Host The C2 Traffic

RedditC2 is an abusing Reddit API To Host The C2 Traffic, Since Most Of The Blue-Team Members Use Reddit, It…

2 years ago

Subfinder – A New Tool to Discover Subdomains for Websites

Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains…

2 years ago

Watcher : Open Source Cybersecurity Threat Hunting Platform

Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organization. It should…

4 years ago