On Tuesday, August 13th at 10 AM Pacific Time (1700UTC), Netflix publicly disclosed a series of vulnerabilities found by Jonathan Looney that impact many implementations of the HTTP2 protocol. A vulnerability found by Piotr Sikora of Google was also re…
From On-Prem to Cloud: The Complete AWS Security Checklist
This complete AWS cloud auditing security checklist outlines what it takes to protect sensitive data center security & intellectual property when securing an organization?s cloud deployment.
Slurp- To Security Audits of S3 Buckets Enumerator
Slurp- Blackbox/Whitebox S3 Bucket Enumerator
To Evaluate the security of S3 buckets
Overview
Credit to all the vendor packages to develop Slurp possible.
Slurp is for pen-testers and security professionals to perform audits of s3 bucke…
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged by endpoint protection.
During an engageme…
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.
With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.
PhanTap is silent in the network an…
iSmartSafe Affiliate Program News
iSmartSafe Affiliate Program News iSmartSafe currently partner with Shareasale to lunch a new affiliate program. Please welcome to apply it as our valuable publishers. Affiliate Program Earn high commissions on sales of iSmartSafe home security systems, home security cameras, door sensors, motion sensors, and accessories! iSmartSafe are the best DIY home security systems because there are no monthly fees, no contracts, and the …
The post iSmartSafe Affiliate Program News appeared first on iSmartSafe.
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible
Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using.
CloudFail is a tactical reconnaissance t…
The Ultimate WinRM Shell For Penetration Testing
This shell is the ultimate WinRM shell for hacking/pentesting.
WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.
A standard SOAP based protocol that allows hardware and operating systems from d…
Diversity of Thought in Tech
At Akamai, we believe innovation is only possible when the various viewpoints and experiences of a collective, culminate to make a great idea. It is the variety of these ideas which is important. Why does diversity of thought matter? When…
USBRIP- Simple Command Live Forensic Tool For Tracking USB device
Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.
usbrip (derived from “USB Ripper”, not “USB R.I.P.” astonished) is an open source forensics tool with CLI interface that lets you keep track…