Exploits & Penetration

85 bookmarks
Newest
LOLBAS
LOLBAS
A curated list of Windows binaries that can used to bypass local security restrictions in misconfigured systems.
·lolbas-project.github.io·
LOLBAS
GTFOBins
GTFOBins
A curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems.
·gtfobins.github.io·
GTFOBins
Imperva
Imperva
Complete cyber security to protect what matters most: your data and apps.
·imperva.com·
Imperva
CrowdStrike
CrowdStrike
We stop breaches with our cloud-native endpoint security platform.
·crowdstrike.com·
CrowdStrike
MITRE ATT&CK®
MITRE ATT&CK®
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations
·attack.mitre.org·
MITRE ATT&CK®
Valimai
Valimai
Email Sender Identity Verification, Authentication & Security Solutions
·valimail.com·
Valimai
SmashTheStack
SmashTheStack
The Smash the Stack Wargaming Network is an ethical hacking environment that simulates real-world software vulnerabilities using challenges, which we call wargames.
·smashthestack.org·
SmashTheStack
CybelAngel
CybelAngel
Digital risk management platform with cybersecurity threat intelligence and data leak detection.
·cybelangel.com·
CybelAngel
Cybereason
Cybereason
Endpoint prevention, detection, and response all in one lightweight agent.
·cybereason.com·
Cybereason
Pulsedive
Pulsedive
A free threat intelligence platform that leverages open-source threat intelligence.
·pulsedive.com·
Pulsedive
Malwarebytes
Malwarebytes
Protects you against malware, ransomware, malicious websites, and other online threats.
·malwarebytes.com·
Malwarebytes
GeekFlare
GeekFlare
A set of free tools to test your site for DNS, Security, Performance, Network and SEO issues.
·tools.geekflare.com·
GeekFlare
CyberChef
CyberChef
The Cyber Swiss Army Knife. A web app for carrying out all manner of "cyber" operations within a web browser: encryption, encoding, compression & data analysis.
·gchq.github.io·
CyberChef
The Big List of Naughty Strings
The Big List of Naughty Strings
An evolving list of strings which have a high probability of causing issues when used as user-input data. This is intended for use in helping both automated and manual QA testing;
·github.com·
The Big List of Naughty Strings
Metasploit
Metasploit
The world's best penetration testing software. Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;
·metasploit.com·
Metasploit
VirusTotal
VirusTotal
Analyze suspicious files and URLs to detect malware, & share them with the security community.
·virustotal.com·
VirusTotal