Click any tag below to further narrow down your results
Links
Hackers are exploiting misconfigured web applications used for security testing to breach Fortune 500 companies. An investigation revealed that over 1,900 vulnerable applications were exposed, allowing attackers to deploy crypto miners and webshells. Many of these apps used default credentials and lacked proper security measures.
This article outlines how a financial services organization shifted from annual pentesting to weekly security validations. This change allowed them to rapidly identify and remediate vulnerabilities, improving overall security posture and visibility into real-world risks.
This on-demand webinar features a demo of XBOW Lightspeed Pentest On Demand, showcasing how it addresses the limitations of traditional penetration testing. The session includes insights on automation and a walkthrough of a complete pentest process.
This article introduces a curated list of hacking tools suitable for hackers, pentesters, and security researchers. Users can easily clone the repository and update it with simple commands. Contributions to the list are welcome.
This article outlines key security vulnerabilities in Next.js applications, including SSRF, XSS, and CSRF. It provides practical tips and techniques for penetration testers to effectively assess Next.js apps.
Shannon is an AI tool designed to autonomously conduct penetration tests on web applications. It identifies vulnerabilities by executing real exploits, not just alerts, helping teams secure their code continuously rather than waiting for annual tests. This approach closes the security gap that arises from frequent code deployment.
reNgine 2.2.0 introduces new features like bounty hub integration, enhanced subdomain enumeration, and customizable PDF reports. It’s a web application reconnaissance tool aimed at security professionals, offering advanced capabilities for data collection and project management. Key updates enhance user experience and streamline reconnaissance tasks.
This article outlines the Cobalt Platform, a service offering continuous penetration testing as a service (PTaaS). It highlights features like on-demand testing, integration automation, and support for various security needs, along with resources for professionals in the field.
XBOW Lightspeed offers rapid, expert-level penetration testing for internet-accessible applications. Tests deliver detailed reports within days, meeting various compliance standards. Pricing starts at $4,000 per test.
Secator is a task and workflow runner designed for security assessments, integrating numerous well-known security tools to enhance the productivity of pentesters and security researchers. It offers a unified command structure, installation options through multiple methods, and customizable features for various tasks, including scanning and crawling. Users can install external tools as needed and leverage additional addons for extended functionality.
EntraFalcon is a PowerShell tool designed for security assessments of Microsoft Entra ID environments, suitable for pentesters and system administrators. It helps identify misconfigurations and risks related to privileged accounts and access policies, generating interactive HTML reports for analysis. The tool operates without external dependencies, supports multiple authentication methods, and is compatible with both Windows and Linux systems.
grpc-scan is a tool developed to automate the enumeration of gRPC services when documentation is lacking and server reflection is disabled. By leveraging gRPC's error messages and patterns in service and method naming, it helps security teams identify potential services and methods within a black-box environment. The tool addresses issues like service sprawl and method proliferation that can lead to security vulnerabilities in gRPC implementations.
Automate your web security documentation with the new "Document My Pentest" Burp Suite extension that captures your testing process in real-time. This open-source tool leverages AI to generate structured reports, reducing repetitive note-taking during penetration tests while highlighting the importance of precise prompt engineering for improved vulnerability analysis.