Slurp- Blackbox/Whitebox S3 Bucket Enumerator
To Evaluate the security of S3 buckets
Overview
Credit to all the vendor packages to develop Slurp possible.
Slurp is for pen-testers and security professionals to perform audits of s3 bucke…
More results...
Slurp- Blackbox/Whitebox S3 Bucket Enumerator
To Evaluate the security of S3 buckets
Overview
Credit to all the vendor packages to develop Slurp possible.
Slurp is for pen-testers and security professionals to perform audits of s3 bucke…
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged by endpoint protection.
During an engageme…
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.
With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.
PhanTap is silent in the network an…
The Black Hat USA keynote encourages better collaboration and a more positive culture
LokiBot is getting stealthier and is now hiding its devastating payload in image files.
Forget wardriving; warshipping is a more targeted way to hit a company’s wireless network, says IBM.
LeapFrog’s Pet Chat app was leaking children’s location, say researchers.
Why the world needs to empower technologists
Now Politicians and boards know cybersecurity, what do we do with the attention?
DoJ indicts man who allegedly paid staff hundreds of thousands