pe3zx
|
7541ca6f43
|
Tools: AWS Security: ThreatResponse/margaritashotgun
|
2018-07-26 10:30:30 +00:00 |
|
pe3zx
|
e7478c68c3
|
Tools: AWS Security: ThreatResponse/aws_ir
|
2018-07-26 10:28:52 +00:00 |
|
pe3zx
|
955876a105
|
Tools: AWS Security: RiotGames/cloud-custodian
|
2018-07-26 10:26:38 +00:00 |
|
pe3zx
|
606adcbf35
|
Tools: AWS Security: sendgrid/krampus
|
2018-07-26 10:24:51 +00:00 |
|
pe3zx
|
a1e399307c
|
Tools: AWS Security: andresriancho/nimbostratus
|
2018-07-26 10:23:20 +00:00 |
|
pe3zx
|
434fc1231f
|
Tools: AWS Security: disruptops/cred_scanner
|
2018-07-26 10:21:22 +00:00 |
|
pe3zx
|
920a69a634
|
Tools: AWS Security: nccgroup/aws-inventory
|
2018-07-26 10:19:29 +00:00 |
|
pe3zx
|
c701a4b334
|
Tools: AWS Security: awslabs/aws-security-benchmark
|
2018-07-26 10:17:47 +00:00 |
|
pe3zx
|
b64417b790
|
Tools: Exploits: SPECTRE Variant 1 scanning tool
|
2018-07-26 10:13:59 +00:00 |
|
pe3zx
|
bf99ab483b
|
Move content in Tools: Windows to Tools: Post Exploitation
|
2018-07-26 10:09:18 +00:00 |
|
pe3zx
|
c3743266e8
|
Tools: Digital Forensics and Incident Response: bromiley/olaf
|
2018-07-26 10:02:39 +00:00 |
|
pe3zx
|
2effa752b3
|
Update TOC
|
2018-07-16 20:35:17 +00:00 |
|
pe3zx
|
b07ad07b2a
|
Tools: Data Sets: BOTS 1.0 Dataset
|
2018-07-16 20:34:52 +00:00 |
|
pe3zx
|
883762c3ba
|
Tools: Data Sets: SecRepo
|
2018-07-16 20:33:25 +00:00 |
|
pe3zx
|
6b072368b7
|
Tools: Cryptography: CERTCC/keyfinder
|
2018-07-16 20:25:26 +00:00 |
|
pe3zx
|
4aa30c5797
|
Remove broken links
|
2018-07-16 19:10:41 +00:00 |
|
pe3zx
|
8f31ca8fc2
|
Tools: Digital Forensics and Incident Response: gleeda/memtriage
|
2018-07-16 19:06:56 +00:00 |
|
pe3zx
|
34da8c330a
|
Tools: Web Application Security: mwrlabs/dref
|
2018-07-02 17:42:45 +00:00 |
|
pe3zx
|
bc47dc961b
|
Tools: Windows: mdsecactivebreach/SharpShooter
|
2018-07-02 17:41:26 +00:00 |
|
pe3zx
|
e448780dd2
|
Tools: Windows: 0xbadjuju/Tokenvator
|
2018-06-25 10:54:21 +07:00 |
|
pe3zx
|
19992becf1
|
Tools: Web Application Security: brannondorsey/dns-rebind-toolkit
|
2018-06-25 10:52:50 +07:00 |
|
pe3zx
|
0652d84706
|
Tools: Adversary Emulation: n0dec/MalwLess
|
2018-06-25 10:47:41 +07:00 |
|
pe3zx
|
7b1615d88b
|
Tools: AWS Security: nccgroup/PMapper
|
2018-06-24 04:39:38 +00:00 |
|
pe3zx
|
73524e4302
|
Remove issue links
|
2018-06-22 15:18:29 +07:00 |
|
pe3zx
|
3e22bbb884
|
Articles: Web Application Security: Exploting CORS misconfigurations for Bitcoins and bounties
|
2018-06-22 14:37:20 +07:00 |
|
pe3zx
|
ebf9cdcfff
|
Tools: AWS Security: cyberark/SkyArk
|
2018-06-19 17:55:31 +07:00 |
|
pe3zx
|
0c5c4dc288
|
Tools: AWS Security: eth0izzle/bucket-stream
|
2018-06-19 17:27:53 +07:00 |
|
pe3zx
|
b99e7512f2
|
Tools: AWS Security: random-robbie/slurp
|
2018-06-19 17:26:43 +07:00 |
|
pe3zx
|
486ae3b316
|
Tools: AWS Security: dagrz/aws_pwn
|
2018-06-19 17:25:01 +07:00 |
|
pe3zx
|
ab57315fe0
|
Tools: AWS Security: carnal0wnage/weirdAAL
|
2018-06-19 17:23:45 +07:00 |
|
pe3zx
|
36fc68ebaa
|
Tools: AWS Security: duo-labs/cloudtracker
|
2018-06-19 17:22:21 +07:00 |
|
pe3zx
|
c330a026d6
|
Tools: AWS Security: duo-labs/cloudmapper
|
2018-06-19 17:21:14 +07:00 |
|
pe3zx
|
41b9357423
|
Tools: AWS Security: prevade/cloudjack
|
2018-06-19 17:19:47 +07:00 |
|
pe3zx
|
76b7b5bbd0
|
Tools: AWS Security: MindPointGroup/cloudfrunt
|
2018-06-19 17:18:41 +07:00 |
|
pe3zx
|
6ac6551a63
|
Tools: AWS Security: airbnb/streamalert
|
2018-06-19 17:17:39 +07:00 |
|
pe3zx
|
f21da1a3f9
|
Tools: AWS Security: Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT).
|
2018-06-19 17:15:48 +07:00 |
|
pe3zx
|
77de480a59
|
Tools: AWS Security: RiotGames/cloud-inquisitor
|
2018-06-19 17:14:15 +07:00 |
|
pe3zx
|
2bfea0410a
|
Tools: AWS Security: toniblyx/prowler
|
2018-06-19 17:04:20 +07:00 |
|
pe3zx
|
2f098dd4e9
|
Tools: AWS Secrutiy: lyft/metadataproxy
|
2018-06-19 17:02:53 +07:00 |
|
pe3zx
|
7c689d02ce
|
Articles: Tutorials: Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1 and Part 2
|
2018-06-19 16:16:36 +07:00 |
|
pe3zx
|
1cb5760fa3
|
Articles: Digital Forensics and Incident Response: Malicious PowerShell in the Registry - Persistence
|
2018-06-19 15:29:04 +07:00 |
|
pe3zx
|
200f3590cb
|
Tools: Mobile Security: nccgroup/house
|
2018-06-18 08:41:56 +00:00 |
|
pe3zx
|
9ac5f17df7
|
Tools: Digital Forensics and Incident Response: IllusiveNetworks-Labs/HistoricProcessTree
|
2018-06-18 08:35:55 +00:00 |
|
pe3zx
|
42bebcefb2
|
Tools: Digital Forensics and Incident Response: williballenthin/process-forest
|
2018-06-18 08:34:24 +00:00 |
|
pe3zx
|
3af10457cb
|
Articles: Digital Forensics and Incident Response: Detection of Backdating The System Clock in MacOS
|
2018-06-18 08:27:09 +00:00 |
|
pe3zx
|
5e4925f4bf
|
Articles: Exploitation: Marshalling to SYSTEM - An analysis of CVE-2018-0824
|
2018-06-18 07:37:59 +00:00 |
|
pe3zx
|
854d738265
|
Tools: Malware Analysis: Koodous
|
2018-06-18 07:35:26 +00:00 |
|
pe3zx
|
89c91767d2
|
Tools: externalist/exploit_playground
|
2018-06-18 06:58:44 +00:00 |
|
pe3zx
|
aa79b9e451
|
Articles: Web Application Security: Advanced CORS Exploitation Techniques
|
2018-06-18 12:47:58 +07:00 |
|
pe3zx
|
39e617b852
|
Tools: AWS Security: asecurityteam/spacecrab
|
2018-06-17 18:14:33 +00:00 |
|