Category: Network PenTest

Find security vulnerabilities

kics v1.4.5 releases: Find security vulnerabilities, compliance issues, and infrastructure misconfigurations

kics KICS stands for Keeping Infrastructure as Code Secure, it is open source and is a must-have for any cloud-native project. Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx....

PatrOwl

PatrowlEngines v1.4.37 releases: Open Source, Free and Scalable Security Operations Orchestration Platform

PatrOwl PatrOwl is a scalable, free and open-source solution for orchestrating Security Operations. PatrowlEngines is the engine framework and the supported list of engines performing the operations (scans, searches, API calls, …) in due time. The...

Cobalt Strike Aggressor Script

Registry-Recon: Performs System/AV/EDR Recon

Registry-Recon Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon Description As a red-team practitioner, we are often using tools that attempt to fingerprint details about a compromised system, preferably in the most stealthy way...

payload delivery tool

EXOCET-AV-Evasion: AV-evading, undetectable, payload delivery tool

EXOCET – AV-evading, undetectable, payload delivery tool EXOCET is superior to Metasploit’s “Evasive Payloads” modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit’s Evasion Payloads uses an easy to detect RC4 encryption....