Black Lantern Security (BLSOPS)
Subscribe
Sign in
Home
Vulnerability Research
Detection Engineering
Products and Tools
Subscriber Requests
Archive
About
New
Top
Discussion
Subdomain Enumeration Tool Face-off 2022
Comparing the industry's top subdomain enumeration tools
TheTechromancer
Oct 12, 2022
2
Share this post
Subdomain Enumeration Tool Face-off 2022
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Introducing TREVORproxy and TREVORspray 2.0
Increasing the Speed and Effectiveness of Password Sprays
TheTechromancer
Jan 19, 2022
1
Share this post
Introducing TREVORproxy and TREVORspray 2.0
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
BBOT
Recursive OSINT Machine
TheTechromancer
Aug 19, 2022
1
Share this post
BBOT
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Yet Another Telerik UI Revisit
Introduction Several vulnerabilities with the popular ASP.NET web application add-on Telerik UI for ASP.NET AJAX have become a frequent source of…
Paul Mueller
Oct 19, 2022
Share this post
Yet Another Telerik UI Revisit
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
WriteHat
A Reporting Tool Written by Pentesters, for Pentesters
TheTechromancer
Dec 2, 2020
Share this post
WriteHat
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
The BLS-Bible
A knowledge-base management tool aimed to improve the lives of information security professionals in all walks of life.
Cody Martin
Feb 8
1
Share this post
The BLS-Bible
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Introducing Offensive-Azure
A Toolkit Written in Python Aiming to Decouple the Relationship Between PowerShell and Offensive Azure tooling
Cody Martin
Mar 30, 2022
Share this post
Introducing Offensive-Azure
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Introducing Badsecrets
A Library for Detecting Known or Weak Secrets Across Many Web Frameworks
Paul Mueller
11 hr ago
Share this post
Introducing Badsecrets
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Enter The Matrix
Enter The Matrix is a Tool to Aid Operators During Risk Assessment in Creating Threat Matrices and Directed Threat Graphs
Cody Martin
Oct 19, 2020
1
Share this post
Enter The Matrix
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Kerberos Cache Manager Ticket Formatter
Release of the KCMTicketFormatter Tool to Format TGTs from the Kerberos Cache Manager
May 29, 2021
Share this post
Kerberos Cache Manager Ticket Formatter
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Introducing the ETM API: Enhanced Capabilities for Black Lantern Security's enter_the_matrix Tool
ETM API provides enhanced abilities for interacting directly on the data collected by ETM including the ability to produce actionable metrics for…
Cody Martin
Jan 31
Share this post
Introducing the ETM API: Enhanced Capabilities for Black Lantern Security's enter_the_matrix Tool
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
Signed Java Applet - Watering Hole Attack
Creating a Signed Java Applet to Phish Users
Micheal Reski
May 1, 2016
Share this post
Signed Java Applet - Watering Hole Attack
blog.blacklanternsecurity.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts