In the wake of the recent trend in using DDE for executing arbitrary command lines, this resource provides a collection of one-liners that allow for the execution of arbitrary code, downloading payloads from remote servers, being proxy aware, using widely deployed Microsoft binaries, being EDR friendly, and working in memory only.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A Live CD and Live USB for penetration testing and security assessment
An open source network penetration testing framework with automatic recon and scanning capabilities.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
Data exfiltration & infiltration tool using text-based steganography to evade security controls.
A digital archive of the internet, allowing users to capture and browse archived web pages.
An open-source intelligence collection, research, and artifact management tool inspired by SpiderFoot, Harpoon, and DataSploit.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.