BadDNS: Open-source tool checks for subdomain takeovers

BadDNS is an open-source Python tool used to check domain and subdomain takeovers. By examining client-side resources and security headers, it can uncover risks that could lead to malicious code being injected if a trusted domain is compromised.

Google Chrome Uses AI to Analyze Pages in New Scam Detection Feature

This feature is believed to help the scam detection service detect the brand and purpose (intent) of a webpage, making it easier to identify potential scams. It works on Mac, Windows, and Linux.

Google Cloud to Mandate MFA for all Users in 2025

Google Cloud announced that it will require multifactor authentication (MFA) for all users by the end of 2025. The company will roll out MFA in phases and start encouraging users to enroll this month.

Osmedeus: Open-Source Workflow Engine for Offensive Security

Osmedeus is an open-source workflow engine designed for offensive security. It serves as a versatile foundation, enabling users to easily create customized reconnaissance systems and scale them across extensive target lists.

Cable: Open-Source, Powerful Tool for Active Directory Post-Exploitation and Enumeration

Cable, an open-source post-exploitation tool built with .NET, focuses on Active Directory (AD) enumeration and exploitation. Cable aims to advance in .NET offensive development within an AD context and enhance AD exploitation techniques.

Whispr: Open-Source Multi-Vault Secret Injection Tool

Whispr ensures safe secret injection with HTTPS, SSL encryption, and CERT validation, enhances local software development with JIT privilege, and custom configurations, eliminating the need for custom scripts.

MaLDAPtive: Open-Source Framework for LDAP SearchFilter Parsing, Obfuscation, and More

MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. The project features a custom C# LDAP parser for tokenization and syntax tree parsing.

EchoStrike: Generate Undetectable Reverse Shells, Perform Process Injection

EchoStrike features an interactive Python wizard for easy customization, various persistence techniques, binary padding for evasion, AES payload encryption, and dynamic binary download.

Chrome Switching to NIST-Approved ML-KEM Quantum Encryption

Google is updating Chrome's post-quantum cryptography to defend against quantum computer attacks. The new encryption system, ML-KEM, replaces Kyber for enhanced security.

DockerSpy: Search for Images on Docker Hub, Extract Sensitive Information

Created to combat data leaks within publicly available Docker images, DockerSpy automates the process of scanning for secrets to enhance security and compliance. Its scanning engine can identify various secret types and provides detailed analysis.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags