Wireless security is specifically established to prevent unauthorized users from accessing and stealing sensitive information from your wireless network. The …
Lightbulb – Framework for Auditing Web Applications Firewalls
LightBulb is an open source python framework for auditing web application firewalls and filters. Web Applications Firewalls (WAFs) are fundamental …
Critical Infrastructure Technology (ICIT) highlights ransomware and RDP access as the current focus
The Institute for Critical Infrastructure Technology (ICIT) points out, in a paper warning of the evolution of what it calls’ …
Top 7 Vulnerability Databases to Trace New Vulnerabilities
Vulnerability defined as the weakness that allows the attacker to enter in and harm, it may be a flaw in …
Scoutsuite – Multi-Cloud Security Auditing Tool
Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs …
IVRE – Network Recon Framework
IVRE (Instrument de veille sur les réseaux extérieurs) or DRUNK (Dynamic Recon of UNKnown networks) is a network recon framework, …
Pixload – Image Payload Creating and Injecting tools
Set of tools for creating/injecting payload into images. Useful references for better understanding of pixload and its use-cases: If you …
Memory Forensics: The Key to Better Cybersecurity
When companies fall victim to a cyberattack, the first thing they do is eliminate the threat. But for cybersecurity investigators, …
What Is an Intrusion Prevention System?
When you need a tool to find and detect malicious activity within a network, an intrusion prevention system (IPS) fills …
Dolos Cloak – Automated 802.1X Bypass
Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using …