A comprehensive list of useful payloads and bypasses for Web Application Security, including README.md files with vulnerability descriptions and exploitation techniques, Intruder files for Burp Intruder, images, and other referenced files. It also covers various attack techniques for Active Directory, Cloud services like AWS and Azure, Linux, Metasploit, network pivoting, reverse shells, subdomain enumeration, and Windows.
Open-source project for building instrumented environments to simulate attacks and test detections.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
A fuzzing framework for Android that creates corrupt media files to identify potential vulnerabilities
A Python script for creating a cohesive and up-to-date penetration testing framework.
A script to enumerate Google Storage buckets and determine access and privilege escalation
GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.