Skip to content
Logo
Logo
  • Home
  • Updates
  • Tutorials
  • Web References
  • Pentest Collection
    • Recon
      • Public info gathering
      • AIO Recon Tools
      • Domain Enum
      • Subdomain Enum
        • Subdomain Takeover
      • Network Scanning
      • Host Scanning
      • Packet Scanning
    • Enumeration
      • Files
      • SSL/TLS
      • Ports
      • Web Attacks
        • General Info
        • Quick tricks
        • Header injections
        • Bruteforcing
        • Online hashes cracking tools
        • Crawl/Fuzz
        • LFI/RFI Tools
        • SQLi
        • Broken Links
        • Clickjacking
        • Cookie Padding
        • CORS
        • CRLF
        • CSP
        • CSRF
        • HTTP Request Smuggling
        • IDOR
        • Session fixation
        • SSRF
        • Web Cache Deception
        • Web Cache Poisoning
        • Web Sockets
        • XSS
        • XXE
    • Exploitation
      • Payloads
      • Reverse Shells
    • Post Exploitation
      • Linux
      • Windows
        • AD
          • Kerberos
        • Powershell tips
      • Pivoting
    • BugBounty Tips
    • Master assessment mindmaps
    • Subdomain tools review
    • Internal Pentest
    • Pentesting Web checklist
    • Code review
    • Password cracking
    • Burp Suite
  • Web Pentest
  • Network Pentest
  • Online Tools
    • Find my IP Address
    • Credentials Splitter
    • Online Port Scanner
    • Email Separator
    • DNS Lookup
    • Clickjacking POC
    • Reverse Tabnabbing POC
    • Gmail – Email Generator
    • Google Hacking
    • URL Encoder
    • Wayback Machine URL Scanner

SharpEDRChecker

New and improved C# Implementation of Invoke-EDRChecker. Checks running processes, process metadata, Dlls loaded into your current process and each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV’s, EDR’s and logging tools. Catches hidden EDRs as well via its […]

Parth Patel Network Pentest 1 min read

RSS Latest in Cyber Security

  • Alert: Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
  • New Report: Unveiling the Threat of Malicious Browser Extensions
  • Sierra:21 - Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks
  • Scaling Security Operations with Automation
  • Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
  • Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution
  • Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks
  • Russia's AI-Powered Disinformation Operation Targeting Ukraine, U.S., and Germany
  • Warning for iPhone Users: Experts Warn of Sneaky Fake Lockdown Mode Attack
  • Generative AI Security: Preventing Microsoft Copilot Data Exposure
  • 15,000 Go Module Repositories on GitHub Vulnerable to Repojacking Attack
  • New Threat Actor 'AeroBlade' Emerges in Espionage Attack on U.S. Aerospace
  • Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability
  • New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
  • Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk
  • New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices
  • LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks
  • Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware
  • Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.
  • Russian Hacker Vladimir Dunaev Pleads Guilty for Creating TrickBot Malware
  • AD
  • AIO Recon Tools
  • Broken Links
  • Bruteforcing
  • BugBounty Tips
  • Burp Suite
  • Clickjacking
  • Code review
  • Command Injection
  • Cookie Padding
  • CORS
  • Crawl/Fuzz
  • CRLF
  • CSP
  • CSRF
  • Deserialization
  • Domain Enum
  • Email attacks
  • Files
  • General Info
  • Header injections
  • Host Scanning
  • HTTP Parameter pollution
  • HTTP Request Smuggling
  • IDOR
  • Internal Pentest
  • Kerberos
  • LFI/RFI Tools
  • Linux
  • Master assessment mindmaps
  • Network Scanning
  • Online hashes cracking tools
  • Packet Scanning
  • Password cracking
  • Pastejacking
  • Payloads
  • Pentesting Web checklist
  • Pivoting
  • Pivoting
  • Ports
  • Powershell tips
  • Prototype Pollution
  • Public info gathering
  • Quick tricks
  • References
  • Reverse Shells
  • Session fixation
  • SQLi
  • SSL/TLS
  • SSRF
  • SSTI
  • Subdomain Enum
  • Subdomain Takeover
  • Subdomain tools review
  • Web Attacks
  • Web Cache Deception
  • Web Cache Poisoning
  • Web Sockets
  • Webshells
  • Webshells
  • Windows
  • XSS
  • XXE

Copyright ©2023 DarkSideOps . All rights reserved. Powered by WordPress & Designed by Bizberg Themes

Terms and Conditions - Privacy Policy