[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
[
vulnerabilities
|
tools
]
NMAP Announce
Nmap 7.95 released: OS and service detection signatures galore!
Npcap Celebrates its 10th Anniversary In Space!
Nmap 26th Birthday Announcement: Version 7.94
Snort
Snort Subscriber Rules Update 2024-12-05
Snort Subscriber Rules Update 2024-12-03
Snort Subscriber Rules Update 2024-11-26
Snort VRT rule Consulting
Snort 2025 Wall Calendars are available now!
Snort Subscriber Rules Update 2024-11-21
calender where do i get a 2025 snort Wall Calender? Please help
Snort Subscriber Rules Update 2024-11-19
Snort Subscriber Rules Update 2024-11-14
Rules
HoneyDB
Generate Key Bug
New Web UI Launched!
HoneyDB Agent v2
Updated Sign In with Google
New Endpoint for IBM Cloud IP Ranges
HoneyDB Python Client v1.5.0
New API Endpoint for Payload History
API Access Update
Removed threatcrowd from IP Info
Server Outage (8/26)
Armitage
Cobalt Strike Staffing Changes and the Road Ahead
Revisiting the UDRL Part 3: Beacon User Data
Cobalt Strike 4.10: Through the BeaconGate
Europol Coordinates Global Action Against Criminal Abuse of Cobalt Strike
Cobalt Strike Infrastructure Downtime – March 2024
Introducing the Mutator Kit: Creating Object File Monstrosities with Sleep Mask and LLVM
Cobalt Strike Infrastructure Maintenance – January 2024
Out of Band Update: Cobalt Strike 4.9.1
Cobalt Strike 4.9: Take Me To Your Loader
Revisiting the User-Defined Reflective Loader Part 2: Obfuscation and Masking
NMAP Dev
crash report
crash
Re: Regarding NMAP Retrigger for snmp-sysdescr
Regarding NMAP Retrigger for snmp-sysdescr
Re: Nmap PR #2909
Re: NSConnection Probe
NSConnection Probe
NSE scripts for SNMPv3?
Nmap PR #2909
NPCAP 1.60 high CPU usage with pcap filter that does not pass anything (Win10)
Kitploit
SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits
PolyDrop - A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit
Secator - The Pentester'S Swiss Knife
Damn-Vulnerable-Drone - An Intentionally Vulnerable Drone Hacking Simulator Based On The Popular ArduPilot/MAVLink Architecture, Providing A Realistic Environment For Hands-On Drone Hacking
File-Unpumper - Tool That Can Be Used To Trim Useless Things From A PE File Such As The Things A File Pumper Would Add
Mass-Assigner - Simple Tool Made To Probe For Mass Assignment Vulnerability Through JSON Field Modification In HTTP Requests
Imperius - Make An Linux Kernel Rootkit Visible Again
BYOSI - Evade EDR's The Simple Way, By Not Touching Any Of The API's They Hook
Psobf - PowerShell Obfuscator
ModTracer - ModTracer Finds Hidden Linux Kernel Rootkits And Then Make Visible Again
© 2024 RiskDiscovery | Sponsored by:
Deception Logic