Sunday, January 19, 2020
Home Tags Security Intelligence

Tag: Security Intelligence

Must Need

PwnAdventure3

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is...
Exploit

Exploit CVE-2017-6079 – Blind Command Injection In Edgewater Edgemarc Devices Exploit

This exploit was developed based on the technical description by depthsecurity https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that...
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...
Mondoo : Native Security & Vulnerability Risk Management

Mondoo : Native Security & Vulnerability Risk Management

Mondoo Cloud is a native security & vulnerability risk management. Quick Start
Facebash : Facebook Brute Forcer In Shellscript Using TOR

Facebash : Facebook Brute Forcer In Shellscript Using TOR

Facebash is a tool for facebook Brute Forcer in shellscript using TOR. Warning : Facebook blocks account for 1...
RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for all your...
Evillimiter

Evillimiter : Tool that Limits Bandwidth of Devices on the Same...

Evillimiter is a tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access.