-
The Washington Post
- New Zealand
- https://cdine.org
- @craSH@mastodon.neg9.org
- @cdine.org
Security
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous …
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
The recursive internet scanner for hackers. 🧡
ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was built keeping NIST recommendations on threat matrices in mi…
Use Touch ID / Secure Enclave for SSH Authentication!
Transform Linux Audit logs for SIEM usage
Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Multiple levels of Pivoting and exposing multiple internal ser…
eBPF-based Security Observability and Runtime Enforcement
Detect Tactics, Techniques & Combat Threats
Spoof SSDP replies and create fake UPnP devices to phish for credentials and NetNTLM challenge/response.
Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
A tool for exploring each layer in a docker image
A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
A collaborative, multi-platform, red teaming framework
Certificate Transparency Log aggregation, parsing, and streaming service written in Elixir
An OOB interaction gathering server and client library
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Create your own vulnerable by design AWS penetration testing playground
Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable SSRF candidates.
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling