Security application

146 Pins
·
5y
Slither v0.6.7 - Static Analyzer For Solidity
Slither v0.6.7 - Static Analyzer For Solidity
Tarnish - A Chrome Extension Static Analysis Tool To Help Aide In Security Reviews
Tarnish - A Chrome Extension Static Analysis Tool To Help Aide In Security Reviews
B2R2 - Collection Of Useful Algorithms, Functions, And Tools For Binary Analysis
B2R2 - Collection Of Useful Algorithms Functions And Tools For Binary Analysis
Sockets, Shellcode, Porting, and Coding: Reverse Engine…
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals by James C. Foster
Writing Security Tools and Exploits
Writing Security Tools and Exploits by James C. Foster
Mitaka - A Browser Extension For OSINT Search
Mitaka - A Browser Extension For OSINT Search
Client Killer – bypass tool for internet cafe clients. – Security List Network™
Client Killer is A Net Cafe client bypass tool. Fully portable, powerful and super beefed up. Complete with array scanners, B-E-A-utiful Flat UI, Stealth Spoofer, and a useful fail safe / panic mode system.
SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach with/without SOC
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most times, the cyber attacks are getting executed in stages. So the SOC team must understand the attack patterns and the attack chain. So breaking the attack chain and averting the criminals intend to […] The post SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach with/without SOC appeared first
Metasploit Released Public Exploit Module for BlueKeep RCE Vulnerability in Remote Desktop Protocol
Metasploit published a public exploit for BlueKeep, the exploit module targets 64-bit versions of Windows 7 and Windows 2008 R2. The Bluekeep is a wormable critical RCE vulnerability in Remote desktop services that let hackers access the vulnerable machine without authentication. Successful exploitation of the vulnerability allows a remote attacker to run arbitrary code on […] The post Metasploit Released Public Exploit Module for BlueKeep RCE Vulnerability in Remote Desktop Protocol appea