We Explore Top Tools Used by Red Teams to Simulate Real-World Attacks
We explore the Top Tools Used by Red Teams to Simulate Real-World Attacks, enhancing cybersecurity through realistic threat simulations.
We explore the Top Tools Used by Red Teams to Simulate Real-World Attacks, enhancing cybersecurity through realistic threat simulations.
Discover How Metasploit Exploits Vulnerabilities and How to Use It Safely. Our tutorial guides you through the process, ensuring safe and effective use.
Discover the key differences between Red Team and Blue Team in cybersecurity. Understand Red Team vs Blue Team: What’s the Difference and Why It Matters
Learn How to Start a Career in Ethical Hacking – A Complete Beginner’s Guide. Discover the steps to become an ethical hacker with our comprehensive guide.
We explore ‘What Is Ethical Hacking and How Does It Work? (Beginner’s Guide)’ to help you understand the fundamentals of cybersecurity and kickstart your career in ethical hacking.
A vulnerability in Uber’s email system allows anyone to send emails on behalf of Uber. This vulnerability could be abused by malicious actors to email 57 million Uber users and drivers whose information was...
Boofuzz is a fork of and the successor to the venerable Sulley fuzzing framework. Besides numerous bug fixes, boofuzz aims for extensibility. The goal: fuzz everything. Why? Sulley has been the preeminent open source...
Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or Telegram using Python to create the files and the listeners. It allows to create text files, images, audio or videos, with the...
FormatFuzzer is a framework for high-efficiency, high-quality generation and parsing of binary inputs. It takes a binary template that describes the format of a binary input and generates an executable that produces and parses...
Private Set Membership (PSM) is a cryptographic protocol that allows clients to privately query whether the client’s identifier is a member of a set of identifiers held by a server in a privacy-preserving manner....
Kunyu, More Efficient Corporate Asset Collection 0x00 Introduce Tool introduction Kunyu (kunyu), whose name is taken from , is actually a professional subject related to geographic information, which counts the geographic information of the...
This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the “Adaptive DLL Hijacking” blog post. I recommend you start there to contextualize this code. This project is...
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the...
HashDB IDA Plugin Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service. Adding New Hash Algorithms The hash algorithm database is open source and new algorithms...
Event Trace Log file reader in pure Python etl-parser is a pure Python 3 parser library for ETL Windows log files. ETL is the default format for ETW as well as the default format...
An HTTP Request Smuggling / Desync testing tool written in Python 3 Acknowledgements A special thanks to James Kettle for his research and methods into HTTP desyncs And a special thanks to Ben Sadeghipour...