Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs …
IVRE – Network Recon Framework
IVRE (Instrument de veille sur les réseaux extérieurs) or DRUNK (Dynamic Recon of UNKnown networks) is a network recon framework, …
Pixload – Image Payload Creating and Injecting tools
Set of tools for creating/injecting payload into images. Useful references for better understanding of pixload and its use-cases: If you …
Memory Forensics: The Key to Better Cybersecurity
When companies fall victim to a cyberattack, the first thing they do is eliminate the threat. But for cybersecurity investigators, …
What Is an Intrusion Prevention System?
When you need a tool to find and detect malicious activity within a network, an intrusion prevention system (IPS) fills …
Dolos Cloak – Automated 802.1X Bypass
Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using …
Phishing Simulation – Phishing Assessment Tool
Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup …
What is the COBIT and why you need to know about it
Business processes today are largely dictated by the technology around them. Cloud computing, big data, and social media are just …
Defining and Understanding User and Entity Behavior Analytics (UEBA)
User and Entity Behavior Analytics, or UEBA for short, provides you with a comprehensive solution for IT security while helping …
U.S Files Lawsuit Against Edward Snowden for Publishing his Book
The united states department of justice filed a LawSuit against Edward Snowden for publishing a book violating the non-disclosure agreements …