Thursday, August 13, 2020
Home Tags IdentYWAF

Tag: IdentYWAF

Must Need

SOC Program

What to Look for in the Right SOC Program – A...

SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter how...
Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

Covenant : A .NET Command & Control Framework That Aims To...

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive...
Capsulecorp Pentest : Vagrant VirtualBox Environment For Conducting An Internal Network Penetration Test

Capsulecorp Pentest : Vagrant VirtualBox Environment For Conducting An Internal Network...

The Capsulecorp Pentest is a small virtual network managed by vagrant and ansible. It contains five virtual machines, including one Linux attacking...
Extended SSRF Search : Smart SSRF Scanner Using Different Methods

Extended SSRF Search : Smart SSRF Scanner Using Different Methods

This tool search for SSRF using predefined settings in different parts of a request (path, host, headers, post and get parameters)....
RTTM : Real Time Threat Monitoring Tool

RTTM : Real Time Threat Monitoring Tool

Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the...
SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command

SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To...

SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it...
Java-Stager

Java-Stager : A PoC To Download, Compile & Execute A Java...

A PoC Java-Stager which can download, compile, and execute a Java file in memory. The key parts of the talk for me are: Load a...