Aggregator
TrickDump: Dump lsass without generating a Minidump file
TrickDump TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. In three steps: Lock: Get OS information using RtlGetVersion. Shock:...
The post TrickDump: Dump lsass without generating a Minidump file appeared first on Penetration Testing Tools.
API Firewall: Fast and light-weight API proxy firewall
Open Source API Firewall API Firewall is a high-performance proxy with API request and response validation based on OpenAPI/Swagger schema. It is designed to protect REST API endpoints in cloud-native environments. It provides API...
The post API Firewall: Fast and light-weight API proxy firewall appeared first on Penetration Testing Tools.
attack flow: helps defenders move from tracking adversary behaviors
Attack Flow The Attack Flow project helps defenders move from tracking adversary behaviors individually to the sequence of techniques adversaries use to achieve their goals. Understanding the context within those sequences, as well as...
The post attack flow: helps defenders move from tracking adversary behaviors appeared first on Penetration Testing Tools.
batfish: network configuration analysis tool
What is Batfish? Batfish is a network validation tool that provides correctness guarantees for security, reliability, and compliance by analyzing the configuration of network devices. It builds complete models of network behavior from device...
The post batfish: network configuration analysis tool appeared first on Penetration Testing Tools.
【通知】第四届全国开源情报技术大会(COSINT 2024)开始预约报名了
【情报】真主党将如何应对BP机、对讲机恐袭带来的通讯挑战
余承东:华为将推出鸿蒙笔记本;传高通有意收购英特尔;《黑神话:悟空》销量已超2000万份 | 极客早知道
What is an Information Security Management System (ISMS)?
If you’ve spent any length of time reading about the internationally accepted security framework laid out in ISO 27001, you’ve likely come across the term ISMS or Information Security Management System. You may wonder, though; what is the ISMS specifically, how do you set one up, and what does it do for your business? Let’s […]
The post What is an Information Security Management System (ISMS)? appeared first on Security Boulevard.