The world needs solutions. With our R&D focus, we’re constantly giving organizations and individuals new ways to secure the technologies and products they rely on. Discover the tools we've developed in-house.
“We can easily see patterns presented in certain ways, but if they are presented in other ways, they become invisible”
– Colin Ware, Information Visualization: Perception for Design (Elsevier, 1999)
Detectree is a tool for visualising cyber security…
Read more
On 30 September 2019, Joani Green and John Rogers gave a talk titled "Performing Linux Investigations at Scale" at the SANS DFIR Summit in Prague.
Read more
Rapidly Hunt and Search Through Windows Event LogsGitHub Repository: https://github. com/Countercept/chainsaw
The tool we are releasing today – Chainsaw – provides blue teams with a powerful first-response capability to quickly identify threats within event logs.
Read more
Two exploit modules for the
Read more
Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely.
Read more
auspex [ˈau̯s. pɛks] noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds. awspx is a graph-based tool for visualizing effective access and resource relationships in AWS environments.
Read more
Custom Command and ControlAttackers must establish command and control (C2) to gain influence within their target environments in order to pursue their goals and objectives.
Read more
OverviewThe timing attack performed by Timeinator is similar to the "sniper" mode in Burp Intruder, however instead of sending a single request for every payload, timeinator is able to send multiple requests for each payload and…
Read more
OverviewUsers regularly copy to their clipboard sensitive data such as usernames and passwords. This makes the clipboard history valuable to attackers when gathering information in order to perform post exploitation activities such as lateral movement.
Read more
OverviewSharpGPOAbuse is a .
Read more
DNS Rebinding Exploitation Framework.
Read more
IntroductionAthena is developed in C# using the . NET framework.
Read more