Category: Open Source Tool
In the world of cybersecurity, penetration testers and red teams need sophisticated tools to assess and improve an organization’s security posture. One such tool gaining traction is Shadow Dumper, an...
Active Directory (AD) remains a core component of enterprise environments, and as such, understanding its vulnerabilities is crucial for both attackers and defenders. Enter Cable, a streamlined, open-source post-exploitation tool...
A recent blog by security researcher Hossam Ehab has detailed an advanced technique for process injection through manipulation of the Kernel Callback Table within the Process Environment Block (PEB) on...
As the number of Internet of Things (IoT) devices continues to rise, so does the urgency to secure these devices. The expanding ecosystem of IoT devices in homes, industries, and...
As businesses increasingly migrate to the cloud, maintaining robust security across diverse cloud platforms becomes paramount. Enter Halberd, a cutting-edge, multi-cloud security testing tool designed to help organizations proactively assess...
A newly released open-source tool has successfully decrypted keys protected by Chrome’s App-Bound Encryption, raising concerns about the long-term efficacy of this security feature. Google Chrome’s App-Bound Encryption (ABE), introduced...
As malware detection techniques evolve, so do the methods attackers use to evade them. VOIDMAW is an innovative memory scanning bypass technique that can effectively hide problematic code from antivirus...
In today’s ever-evolving cybersecurity landscape, identifying vulnerabilities in codebases is critical for maintaining secure software and infrastructure. Vulnhuntr, an open-source tool available on GitHub, leverages Large Language Models (LLMs) and...
In the ever-evolving landscape of cybersecurity, penetration testing (pen testing) and security assessments are vital to identifying vulnerabilities before they can be exploited by malicious actors. However, one of the...
In today’s rapidly evolving cybersecurity landscape, organizations need tools that can help them stay ahead of threats by identifying vulnerabilities and preparing for potential cyberattacks. OpenBAS (Open-source Breach and Attack...
Renowned security researcher Marcus Hutchins has unveiled a new open-source tool designed to help administrators and security professionals identify vulnerable instances of the Common Unix Printing System (CUPS), which is...
Renowned security researcher Renniepak, the founder of Hacker Hideout, has launched an open-source tool called CSP Bypass. This tool is designed to assist ethical hackers and security researchers in identifying...
In today’s increasingly complex threat landscape, organizations require agile and scalable security solutions to effectively identify and respond to evolving attack vectors. Venator, an open-source threat detection platform, offers a...
PDF files are a staple in today’s digital world, used for everything from business documents to user manuals. However, like any widely adopted format, PDFs can be exploited to carry...
In today’s complex cybersecurity landscape, security teams face the dual challenge of uncovering new vulnerabilities and efficiently managing remediation efforts. Faraday emerges as a powerful solution, bridging this gap by...