Sunday, July 5, 2020
Home Tags TakeOver

Tag: TakeOver

Must Need

SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management...

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main...
Google Play Store

Malicious Apps Change Their Name To Be Back On Google Play...

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google completes a great job...
RE:TERNAL : Repo Containing Docker-Compose Files & Setup Scripts

RE:TERNAL : Repo Containing Docker-Compose Files & Setup Scripts

RE:TERNAL is a centralized purple team simulation platform. Reternal uses agents installed on a simulation network to execute various known red-teaming...
WSSAT

WSSAT – Web Service Security Assessment Tool

WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing...
Sitadel

Sitadel – Web Application Security Scanner

Sitadel is basically an update for WAScan making it compatible for python >= 3.4 It allows more flexibility for you to write new...
Youzer : Fake User Generator For Active Directory Environments

Youzer : Fake User Generator For Active Directory Environments

Fake User Generator for Active Directory Environments. The goal of Youzer is to create information rich Active Directory environments. This uses the python3...
MSSQLi-DUET : MSSQL Injection-based Domain User Enumeration Tool

MSSQLi-DUET : MSSQL Injection-based Domain User Enumeration Tool

SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing. Supports various forms of...