Skip to content
Logo
Logo
  • Home
  • Updates
  • Tutorials
  • Web References
  • Pentest Collection
    • Recon
      • Public info gathering
      • AIO Recon Tools
      • Domain Enum
      • Subdomain Enum
        • Subdomain Takeover
      • Network Scanning
      • Host Scanning
      • Packet Scanning
    • Enumeration
      • Files
      • SSL/TLS
      • Ports
      • Web Attacks
        • General Info
        • Quick tricks
        • Header injections
        • Bruteforcing
        • Online hashes cracking tools
        • Crawl/Fuzz
        • LFI/RFI Tools
        • SQLi
        • Broken Links
        • Clickjacking
        • Cookie Padding
        • CORS
        • CRLF
        • CSP
        • CSRF
        • HTTP Request Smuggling
        • IDOR
        • Session fixation
        • SSRF
        • Web Cache Deception
        • Web Cache Poisoning
        • Web Sockets
        • XSS
        • XXE
    • Exploitation
      • Payloads
      • Reverse Shells
    • Post Exploitation
      • Linux
      • Windows
        • AD
          • Kerberos
        • Powershell tips
      • Pivoting
    • BugBounty Tips
    • Master assessment mindmaps
    • Subdomain tools review
    • Internal Pentest
    • Pentesting Web checklist
    • Code review
    • Password cracking
    • Burp Suite
  • Web Pentest
  • Network Pentest
  • Online Tools
    • Find my IP Address
    • Credentials Splitter
    • Online Port Scanner
    • Email Separator
    • DNS Lookup
    • Clickjacking POC
    • Reverse Tabnabbing POC
    • Gmail – Email Generator
    • Google Hacking
    • URL Encoder
    • Wayback Machine URL Scanner

SharpEDRChecker

New and improved C# Implementation of Invoke-EDRChecker. Checks running processes, process metadata, Dlls loaded into your current process and each DLLs metadata, common install directories, installed services and each service binaries metadata, installed drivers and each drivers metadata, all for the presence of known defensive products such as AV’s, EDR’s and logging tools. Catches hidden EDRs as well via its […]

Parth Patel Network Pentest 1 min read

RSS Latest in Cyber Security

  • Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.
  • Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware
  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp's New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign-Based Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious Emails
  • North Korea's Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks
  • This Free Solution Provides Essential Third-Party Risk Management for SaaS
  • 7 Uses for Generative AI to Enhance Security Operations
  • CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks
  • U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean Hackers
  • Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.
  • 200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn
  • Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions
  • Okta Discloses Broader Impact Linked to October 2023 Support System Breach
  • AD
  • AIO Recon Tools
  • Broken Links
  • Bruteforcing
  • BugBounty Tips
  • Burp Suite
  • Clickjacking
  • Code review
  • Command Injection
  • Cookie Padding
  • CORS
  • Crawl/Fuzz
  • CRLF
  • CSP
  • CSRF
  • Deserialization
  • Domain Enum
  • Email attacks
  • Files
  • General Info
  • Header injections
  • Host Scanning
  • HTTP Parameter pollution
  • HTTP Request Smuggling
  • IDOR
  • Internal Pentest
  • Kerberos
  • LFI/RFI Tools
  • Linux
  • Master assessment mindmaps
  • Network Scanning
  • Online hashes cracking tools
  • Packet Scanning
  • Password cracking
  • Pastejacking
  • Payloads
  • Pentesting Web checklist
  • Pivoting
  • Pivoting
  • Ports
  • Powershell tips
  • Prototype Pollution
  • Public info gathering
  • Quick tricks
  • References
  • Reverse Shells
  • Session fixation
  • SQLi
  • SSL/TLS
  • SSRF
  • SSTI
  • Subdomain Enum
  • Subdomain Takeover
  • Subdomain tools review
  • Web Attacks
  • Web Cache Deception
  • Web Cache Poisoning
  • Web Sockets
  • Webshells
  • Webshells
  • Windows
  • XSS
  • XXE

Copyright ©2023 DarkSideOps . All rights reserved. Powered by WordPress & Designed by Bizberg Themes

Terms and Conditions - Privacy Policy