Skip to content
Logo
Logo
  • Home
  • Updates
  • Tutorials
  • Web References
  • Pentest Collection
    • Recon
      • Public info gathering
      • AIO Recon Tools
      • Domain Enum
      • Subdomain Enum
        • Subdomain Takeover
      • Network Scanning
      • Host Scanning
      • Packet Scanning
    • Enumeration
      • Files
      • SSL/TLS
      • Ports
      • Web Attacks
        • General Info
        • Quick tricks
        • Header injections
        • Bruteforcing
        • Online hashes cracking tools
        • Crawl/Fuzz
        • LFI/RFI Tools
        • SQLi
        • Broken Links
        • Clickjacking
        • Cookie Padding
        • CORS
        • CRLF
        • CSP
        • CSRF
        • HTTP Request Smuggling
        • IDOR
        • Session fixation
        • SSRF
        • Web Cache Deception
        • Web Cache Poisoning
        • Web Sockets
        • XSS
        • XXE
    • Exploitation
      • Payloads
      • Reverse Shells
    • Post Exploitation
      • Linux
      • Windows
        • AD
          • Kerberos
        • Powershell tips
      • Pivoting
    • BugBounty Tips
    • Master assessment mindmaps
    • Subdomain tools review
    • Internal Pentest
    • Pentesting Web checklist
    • Code review
    • Password cracking
    • Burp Suite
  • Web Pentest
  • Network Pentest
  • Online Tools
    • Find my IP Address
    • Subdomain Scanner
    • Online Port Scanner
    • Email Separator
    • DNS Lookup
    • Clickjacking POC
    • Reverse Tabnabbing POC
    • Gmail – Email Generator
    • Google Hacking

SharpEDRChecker

New and improved C# Implementation of Invoke-EDRChecker. Checks running processes, process metadata, Dlls loaded into your current process and each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV’s, EDR’s and logging tools. Catches hidden EDRs as well via its […]

Parth Patel Network Pentest 1 min read

RSS Latest in Cyber Security

  • Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
  • Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
  • The Business of Hackers-for-Hire Threat Actors
  • CISA Issues Warning on Active Exploitation of UnRAR Software for Linux Systems
  • Microsoft Issues Patches for 121 Flaws, Including Zero-Day Under Active Attack
  • 10 Credential Stealing Python Libraries Found on PyPI Repository
  • Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions
  • U.S. Sanctions Virtual Currency Mixer Tornado Cash for Alleged Use in Laundering
  • Twilio Suffers Data Breach After Employees Fall Victim to SMS Phishing Attack
  • The Truth About False Positives in Security
  • Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore
  • New Orchard Botnet Uses Bitcoin Founder’s Account Info to Generate Malicious Domains
  • The Benefits of Building a Mature and Diverse Blue Team
  • Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
  • Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
  • New IoT RapperBot Malware Targeting Linux Servers via SSH Brute-Forcing Attack
  • Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government
  • Slack Resets Passwords After a Bug Exposed Hashed Passwords for Some Users
  • Resolving Availability vs. Security, a Constant Conflict in IT
  • Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
  • AD
  • AIO Recon Tools
  • Broken Links
  • Bruteforcing
  • BugBounty Tips
  • Burp Suite
  • Clickjacking
  • Code review
  • Command Injection
  • Cookie Padding
  • CORS
  • Crawl/Fuzz
  • CRLF
  • CSP
  • CSRF
  • Deserialization
  • Domain Enum
  • Email attacks
  • Files
  • General Info
  • Header injections
  • Host Scanning
  • HTTP Parameter pollution
  • HTTP Request Smuggling
  • IDOR
  • Internal Pentest
  • Kerberos
  • LFI/RFI Tools
  • Linux
  • Master assessment mindmaps
  • Network Scanning
  • Online hashes cracking tools
  • Packet Scanning
  • Password cracking
  • Pastejacking
  • Payloads
  • Pentesting Web checklist
  • Pivoting
  • Pivoting
  • Ports
  • Powershell tips
  • Prototype Pollution
  • Public info gathering
  • Quick tricks
  • References
  • Reverse Shells
  • Session fixation
  • SQLi
  • SSL/TLS
  • SSRF
  • SSTI
  • Subdomain Enum
  • Subdomain Takeover
  • Subdomain tools review
  • Web Attacks
  • Web Cache Deception
  • Web Cache Poisoning
  • Web Sockets
  • Webshells
  • Webshells
  • Windows
  • XSS
  • XXE

Copyright ©2022 DarkSideOps . All rights reserved. Powered by WordPress & Designed by Bizberg Themes

Terms and Conditions - Privacy Policy