Offensive Sec Blog

Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

Thursday, May 30, 2024

Parsing Logs for Advanced Attacks: A Comprehensive Guide

›
In this post, we will explore a Python script designed to parse logs containing url:user:pass data. These logs are instrumental in executin...
Saturday, May 18, 2024

Analyzing APK Files for Security Vulnerabilities with APK Monster

›
As mobile applications become more integral to our daily lives, ensuring their security is paramount. Vulnerabilities in mobile apps can exp...
Saturday, May 11, 2024

Harnessing the Deep and Dark Web for Cyber Threat Intelligence

›
As cyber threats evolve, so must our strategies to combat them. The deepdarkCTI project serves as a crucial resource, offering access to a c...

Gtfocli - GTFO Command Line Interface For Easy Binaries Search Commands That Can Be Used To Bypass Local Security Restrictions In Misconfigured Systems

›
GTFOcli it's a Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in mis...

Moukthar - Android Remote Administration Tool

›
Remote adminitration tool for android Features Notifications listener SMS listener Phone call recording Image capturing and sc...

LeakSearch - Search & Parse Password Leaks

›
LeakSearch is a simple tool to search and parse plain text passwords using ProxyNova COMB (Combination Of Many Breaches) over the Interne...

Huntr-Com-Bug-Bounties-Collector - Keep Watching New Bug Bounty (Vulnerability) Postings

›
New bug bounty(vulnerabilities) collector Requirements Chrome with GUI (If you encounter trouble with script execution, check the stat...
Wednesday, March 13, 2024

BackDoorSim - An Educational Into Remote Administration Tools

›
BackdoorSim is a remote administration and monitoring tool designed for educational and testing purposes. It consists of two main componen...

CVE-2024-23897 - Jenkins <= 2.441 & <= LTS 2.426.2 PoC And Scanner

›
Exploitation and scanning tool specifically designed for Jenkins versions <= 2.441 & <= LTS 2.426.2 . It leverages CVE-2024-23897...

swaggerHole - A Python3 Script Searching For Secret On Swaggerhub

›
Introduction  This tool is made to automate the process of retrieving secrets in the public APIs on [swaggerHub](https://app.swaggerhub.com...
Friday, February 23, 2024

RepoReaper - An Automated Tool Crafted To Meticulously Scan And Identify Exposed .Git Repositories Within Specified Domains And Their Subdomains

›
RepoReaper is a precision tool designed to automate the identification of exposed .git repositories across a list of domains and subdomai...

SploitScan - A Sophisticated Cybersecurity Utility Designed To Provide Detailed Information On Vulnerabilities And Associated Proof-Of-Concept (PoC) Exploits

›
SploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and th...
›
Home
View web version
Powered by Blogger.