Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once. Purpose Brute-forcing …
NSO Group’s Pegasus spyware used against journalists, political activists worldwide
An investigation into leaked data allegedly connected to NSO Group has resulted in claims that its software is being used …
GitHub boosts supply chain security for Go modules
GitHub has announced a slew of supply chain security upgrades for modules based on the Go programming language. On July …
TeamsUserEnum – User Enumeration With Microsoft Teams API
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email …
Beanshooter – JMX Enumeration And Attacking Tool
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.Introduction JMX stands …
UK and White House blame China for Microsoft Exchange Server hack
The UK government has formally laid the blame for the Microsoft Exchange Server cyberattack at the feet of China. On …
Allsafe – Intentionally Vulnerable Android Application
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like …
Microsoft heads to court to take on imposter, homoglyph domains
Microsoft has turned to the court system to take down domains designed to impersonate the firm in phishing attacks. On …
Regexploit – Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)
Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the Doyensec blog Many default …
HP patches vulnerable driver lurking in printers for 16 years
HP has patched a severe vulnerability that has been hidden in a printer driver for 16 years. On Tuesday, SentinelLabs …