This tool is designed to weaponize Kerberos protocol flaws by abusing vulnerabilities in the Kerberos v5 protocol, allowing for enumeration/brute force attacks on domain users and obtaining Kerberos TGS-REP and AS-REP tickets without sending packets to target systems, making the attacks stealthy and hard to detect.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
Sublist3r is a python tool for enumerating subdomains using OSINT and various search engines.
A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments
A Linux-based environment for penetration testing and vulnerability exploitation
Modular framework for web services penetration testing with support for various attacks.
Data exfiltration & infiltration tool using text-based steganography to evade security controls.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.