-
All
While operating in a large SOC, we are trying to use RITA and have seen tremendous number of potential beacons from the "show beacons" command. What are some best practices for filtering resul…
-
## To register, companies must meet the following criteria:
* Deliver cybersecurity products or services, category definitions can be [found here](categories.md)
* Hold a valid Australian Business…
-
Sorry if you are facing issues regarding installation and about uncomplete description, actually im working on Pro version.
Beta version is just a simple one but Pro version will be Pro, its comple…
-
Hi,
Nice work you guys are doing.
So during some pentests, after finding a vulnerability and exploiting them, supervisors would still request for reports generated by the tool that was used to fi…
-
This happens to me quite a lot. When I perform a command which outputs a lot of output such as long file listing, the shell hangs and I have to initiate a separate connection to kill it. Even CTRL+C …
-
**Is your feature request related to a problem? Please describe.**
I use distrobox to automatically create new containers for each pentest engagement I work on keeping the client files and data sepa…
-
# Summary
Currently it can be difficult to understand what requests were made in Burp based on what UI elements were clicked. It would be interesting to visually (eg. mindmap, etc) map out all of t…
-
In your initial blog post, you had a small teaser about an ntdissector2bloodhound script at the end of the article.
Did you already make any progress on this? :)
In the follow-up article you wrote "…
-
# Hacker Tools (Updated 2019) Sn1per, Wireshark, Metasploit, Hydra..
##### UPDATED FOR 2019
HACKER TOOLS TOP TEN
--------------------
Since 2014 we’ve listed the web’s…
-
### Description
It would be very useful to generate SBOM with purl entries through [purl2cpe](https://github.com/scanoss/purl2cpe) which is licensed under MIT. My basic idea would be to fill purl e…