Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. UsageUsing Corsy is pretty simplepython corsy.py -u https://example.comA...
Flan Scan is a lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network, identify services...
According to digital forensics specialists, a company that provides IT services to the New York Police Department (NYPD) accidentally disconnected the database...
These are bad news for software programmers worldwide. Vulnerability testing researchers report the finding of 37 security flaws affecting four major implementations...
Currently any company is exposed to computer security incidents. This time, web application security experts report that OnePlus, a smartphone manufacturer based...
Data breaches have become routine, although each new reported incident seems to more seriously affect a larger number of users. Data protection...
AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that can detect,analyze...
RE:TERNAL is a centralised purple team simulation platform. Reternal uses agents installed on a simulation network to execute various known red-teaming techniques...
Inspired by https://github.com/jmagnusson/bgtunnel, which doesn’t work on Windows.See also: https://github.com/paramiko/paramiko/blob/master/demos/forward.py Requirements paramiko Installationsshtunnel is on PyPI, so simply run: pip install sshtunnel...
Glances is a cross-platform monitoring tool which aims to present a large amount of monitoring information through a curses or Web based...
The purpose of this tool is to help penetration testers identify potentially valuable targets on the internal network environment. By aggregating netstat...
RdpThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the clear-text credentials...
Again, new reports of security flaws that could affect the millions of WordPress users, the most popular content management system (CMS), have...
DNCI allows the injection of .Net code (.exe or .dll) remotely in unmanaged processes in windows. 1. Project StructureThe project is structured...
Being able to hide or continually rotate the source IP address when making web calls can be difficult or expensive. A number...
Information security specialists from firm vpnMentor, led by expert Noam Rotem, discovered a data breach that affected Gekko Group, a subsidiary brand...
A report recently published by Unicorn Riot, an independent digital media collective, has revealed a hacking operation against a major money laundering...
Network security researchers from Netlab firm have just released a report that mentions that Linux servers running no patched Webmin installations are...
Tooling that automates your social media interactions to collect posts, photos, videos, friends, followers and much more on Facebook. FeaturesA bot which...
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command. The beauty of this tool is that it doesn’t perform authentication...
A research published by vulnerability testing experts at security firm Onapsis claims that multiple vulnerabilities have been discovered in Oracle’s E-Business Suite....