Category: Penetration Testing

IoT security toolkit

Genzai: The IoT security toolkit

Genzai Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as input and scan them for default password issues and potential vulnerabilities based on...

AWS backdoors

C2 Cloud: robust web-based C2 framework

C2 Cloud The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the...

CVE-2024-2883

Google Chrome Update Patches High-Risk Vulnerabilities

Google has released an important security update for its Chrome browser (version 123.0.6312.86/.87), addressing seven security vulnerabilities, including four rated as “High” and one “Critical” flaw. Critical Vulnerability and Large Payout CVE-2024-2883: Use after...

HTML Smuggling Attack

BobTheSmuggler: Leverages HTML Smuggling Attack

Bob the Smuggler “Bob the Smuggler” is a tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The tool would compress your binary (EXE/DLL) into 7z/zip...

OWASP API Top 10 Checks

OFFAT: OFFensive Api Tester

OWASP OFFAT OWASP OFFAT (OFFensive Api Tester) is created to automatically test API for common vulnerabilities after generating tests from the openapi specification file. It provides the feature to automatically fuzz inputs and use...