The Klyda project has been created to aid in quick credential based attacks against online web applications.Klyda supports the use …
NGWAF – First Iteration Of ML Based Feedback WAF
With the explosive growth of web applications since the early 2000s, web-based attacks have progressively become more rampant. One common …
Sandman – NTP Based Backdoor For Red Team Engagements In Hardened Networks
Sandman is a backdoor that is meant to work on hardened networks during red team engagements. Sandman works as a …
AutoPWN Suite – Project For Scanning Vulnerabilities And Exploiting Systems Automatically
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. How does it work? AutoPWN Suite uses nmap …
Labtainers – A Docker-based Cyber Lab Framework
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or …
Sub3Suite – A Free, Open Source, Cross Platform Intelligence Gathering Tool
Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping. Supports both …
GoodHound – Uses Sharphound, Bloodhound And Neo4j To Produce An Actionable List Of Attack Paths For Targeted Remediation
Attackers think in graphs, defenders think in actions, management think in charts. GoodHound operationalises Bloodhound by determining the busiest paths …
Espionage – A Network Packet And Traffic Interceptor For Linux. Spoof ARP And Wiretap A Network
Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows …
Norwegian Media Behemoth is the Latest Victim of Cybercrime
Amedia, a Norwegian print house, is the latest victim of cyberattacks that the company has termed an apparent “severe” cyberattack. …
Microsoft’s Loop Project Management Software
Microsoft has been developing a project collaboration solution for enterprise projects. The Loop app is now accessible to Microsoft 365 …