#penTest

2025-08-21

Local SYSTEM auth trigger for relaying🕵️‍♂️

github.com/rtecCyberSec/RAITri

#infosec #cybersecurity #redteam #pentest

2025-08-20

A tool to transform Chromium browsers into a C2 Implant🕵️‍♂️

github.com/praetorian-inc/Chro

#infosec #cybersecurity #redteam #pentest #opensource

2025-08-19

Weaponize DLL hijacking easily. Backdoor any function in any DLL🕵️‍♂️

github.com/Print3M/DllShimmer

#infosec #cybersecurity #redteam #pentest #opensource

2025-08-18

A Python reconnaissance tool designed to discover Azure services and attribute tenant ownership information based on their responses.🕵️‍♂️

github.com/NetSPI/ATEAM

#infosec #cybersecurity #pentest #redteam #cloud #opensource

2025-08-18

Mini Pen Test Diaries story, happened in the last couple of years. The debrief meeting went like this:

“In your report you said you we’re able to crack the domain admin account instantly because the password was stored using the LM hash?”

“That’s right, yes.”

“But we’ve had LM hashing disabled for like 15 years, that can’t be possible?!”

“When was the last time that password was changed?”

“Well it’s been the same since I got here, 20 years ago.”

“And what hashing mechanism do you think was used back then?”

“Oh no."

For more, less mini stories like this, check out infosecdiaries.com.

#infosec #pentest #pentesting #redteam

dan_nannidan_nanni
2025-08-16

OS fingerprinting works by analyzing a system’s network responses or behavior to identify its operating system. In offensive security, it helps attackers tailor exploits to known OS-specific vulnerabilities

Here are freely available OS fingerprinting tools 😎👇

Find high-res pdf books with all my related infographics at study-notes.org

2025-08-15

FindMeAccess is a tool useful for finding gaps in Azure/M365 MFA requirements for different resources, client ids, and user agents🕵️‍♂️

github.com/absolomb/FindMeAcce

#infosec #cybersecurity #pentest #redteam #azure #entra #cloud #opensource

2025-08-14

„Recursive Request Exploits (RRE) trace API chains backward from a protected resource (like a video stream) back to it's origin.
If any upstream API is unauthenticated, the whole chain can be abused to bypass access. This Burp extension automates this to find low-trust inputs that generate high-value outputs”

github.com/jumpycastle/rre-burp

#pentest #pentesting #vulnerability #appsec #webdev #programming #cybersecurity

nickbeardednickbearded
2025-08-14

Arch is down (again). AskUbuntu is hotter than OnlyFans. Kali’s fresh ISO comes with 500 updates pre-installed. BlackArch is a museum of broken clones. BackBox vanished like a ghost.

Meanwhile, the few who actually know what they’re doing quietly grab BashCoreTX.

No drama, just domination. 😆👊💪

2025-08-14

A post about how misconfigured Intune certificate deployment via ADCS can enable attackers to escalate from a cloud-managed endpoint to Domain Admin in Active Directory🕵️‍♂️

dirkjanm.io/extending-ad-cs-at

#infosec #cybersecurity #pentest #redteam #cloud

2025-08-14

📢Neu im Research-Blog: Red-Team Glossar
Begriffe wie #RedTeaming #Penetrationstest oder Adversary Simulation begegnen uns immer wieder – doch was bedeuten sie wirklich? Unser Glossar bündelt die wichtigsten Fachbegriffe aus der Welt der offensiven #Cybersicherheit an einem Ort.

Klar strukturiert und verständlich von unseren Experten Marcel Heisel und Rouven Koslowski erklärt, hilft es dabei, die oft missverständlich oder inflationär genutzten Begriffe richtig einzuordnen und besser zu verstehen.
Jetzt aufschlauen 👉 research.hisolutions.com/2025/
#ResearchBlog #Resilienz #Pentest

Bildtitel: Research-Blog
Red-Team-Glossar
2025-08-13

A post that describes a scenario in which a user could be coerced into inadvertently giving an attacker access to their entire home drive or other network shares🕵️‍♂️

blog.delivr.to/filejacking-exf

#infosec #cybersecurity #pentest #redteam #phishing

Tanya Janca | SheHacksPurple :verified: :verified:SheHacksPurple@infosec.exchange
2025-08-11

🎥 Missed one of my past conference talks? Let’s fix that.

I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.

“DIY Azure Security Assessment" - with Teri Radichel
📽️ twp.ai/4ipUKe

#CyberSecurity #SecurityAwareness #azure #pentest

2025-08-11

A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such as Zoom🕵️‍♂️

github.com/praetorian-inc/turnt

#infosec #cybersecurity #pentest #redteam #opensource

2025-08-09

Using Notion for Cybersecurity Notes

In this article, I covered creating files, organizing them, making to-do lists, building tables, and setting up timelines — all of which will help you start exploring this tool with more confidence and apply it to your cybersecurity needs.

air-academy.org/using-notion-f
#notion #cybersecurity #tech #osint #pentest

2025-08-08

PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph🕵️‍♂️

github.com/SpecterOps/MSSQLHou

#infosec #cybersecurity #pentest #redteam #opensource

2025-08-07

BRS-XSS: Новое поколение сканера уязвимостей XSS

BRS-XSS - это профессиональный инструмент для сканирования уязвимостей Cross-Site Scripting (XSS), разработанный компанией EasyProTech LLC в рамках экосистемы Brabus Recon Suite (BRS). Он создан разработчиком Brabus и впервые опубликован 7 августа 2025 года. Проект ориентирован на специалистов по информационной безопасности, пентестеров и командный редтиминг. Архитектура построена на Python с акцентом на модульность, масштабируемость и практическое применение. Репозиторий: github.com/EPTLLC/brs-xss

habr.com/ru/articles/934884/

#python #async #xss #pentest #xssscanner #securityanalysis

2025-08-06

PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph🕵️‍♂️

github.com/G0ldenGunSec/SCCM_S

#infosec #cybersecurity #pentest #redteam #opensource

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst