Comparing the industry's top subdomain enumeration tools
Increasing the Speed and Effectiveness of Password Sprays
Recursive OSINT Machine
Introduction Several vulnerabilities with the popular ASP.NET web application add-on Telerik UI for ASP.NET AJAX have become a frequent source of…
A Reporting Tool Written by Pentesters, for Pentesters
A knowledge-base management tool aimed to improve the lives of information security professionals in all walks of life.
A Toolkit Written in Python Aiming to Decouple the Relationship Between PowerShell and Offensive Azure tooling
A Library for Detecting Known or Weak Secrets Across Many Web Frameworks
Enter The Matrix is a Tool to Aid Operators During Risk Assessment in Creating Threat Matrices and Directed Threat Graphs
Release of the KCMTicketFormatter Tool to Format TGTs from the Kerberos Cache Manager
ETM API provides enhanced abilities for interacting directly on the data collected by ETM including the ability to produce actionable metrics for…
Creating a Signed Java Applet to Phish Users