Tools

The world needs solutions. With our R&D focus, we’re constantly giving organizations and individuals new ways to secure the technologies and products they rely on. Discover the tools we've developed in-house.

Tool

Cat-Scale Linux Incident Response Collection

On 30 September 2019, Joani Green and John Rogers gave a talk titled "Performing Linux Investigations at Scale" at the SANS DFIR Summit in Prague.

Read more

Tool

Chainsaw

Rapidly Hunt and Search Through Windows Event LogsGitHub Repository: https://github. com/Countercept/chainsaw

The tool we are releasing today – Chainsaw – provides blue teams with a powerful first-response capability to quickly identify threats within event logs.

Read more

Tool

Metasploit Modules for RCE in Apache NiFi and Kong API Gateway

Two exploit modules for the Metasploit framework to assist consultants in verifying vulnerabilities when encountering Kong API Gateway and Apache NiFi on network security assessments.

Read more

Tool

Physmem2profit

Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely.

Read more

Tool

awspx

auspex [ˈau̯s. pɛks] noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds. awspx is a graph-based tool for visualizing effective access and resource relationships in AWS environments.

Read more

Tool

C3

Custom Command and ControlAttackers must establish command and control (C2) to gain influence within their target environments in order to pursue their goals and objectives.

Read more

Tool

Timeinator

OverviewThe timing attack performed by Timeinator is similar to the "sniper" mode in Burp Intruder, however instead of sending a single request for every payload, timeinator is able to send multiple requests for each payload and…

Read more

Tool

SharpClipHistory

OverviewUsers regularly copy to their clipboard sensitive data such as usernames and passwords. This makes the clipboard history valuable to attackers when gathering information in order to perform post exploitation activities such as lateral movement.

Read more

Tool

SharpGPOAbuse

OverviewSharpGPOAbuse is a .

Read more

Tool

dref

DNS Rebinding Exploitation Framework.

Read more

Tool

Athena

IntroductionAthena is developed in C# using the . NET framework.

Read more

Tool

WePWNise

WePWNise is a proof-of-concept python script that generates architecture independent VBA code to be used in Office documents or templates.

Read more