Wednesday, November 13, 2019
Home Tags Security Assessments

Tag: Security Assessments

Must Need

Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien tool launches attack on k8s cluster from within. That means you already need to have an access with permission to deploy...
Pyattck : A Python Module To Interact With The Mitre ATT&CK Framework

Pyattck : A Python Module To Interact With The Mitre ATT&CK...

A Python Module to interact with the Mitre ATT&CK Framework. Pyattck has the following notable features in it's current release:
Easysploit

Easysploit : Metasploit Automation Easier & Faster Than Ever

The laterst version of EasySploit v3.1, which makes Metasploit automation easier and faster than ever. Following are the new options...
Malwoverview

Malwoverview – Tool To Perform An Initial & Quick Triage On...

Malwoverview is a first response tool to perform an initial and quick triage on either a directory containing malware samples or a specific malware...
Dolos Cloak : Automated 802.1x Bypass

Dolos Cloak : Automated 802.1x Bypass

Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced...
Killcast

Killcast : Manipulate Chromecast Devices in your Network

Killcast manipulate chromecast devices in your network. This tool is a Proof of Concept and is for Research Purposes Only, it shows...

Five Benefits That Will Convince You to Integrate Your Systems

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad thing. It has...