Practical guide to Drone hacking for penetration testers. This research is helping equip security professionals with the tools to test the effectiveness of their drone defenses and eliminate exposed attack vectors.
Practical guide to RFID hacking for penetration testers. Investigates the latest attack tools and techniques available for stealing and using RFID proximity badge information to gain unauthorized access to buildings and other secure areas.
Bishop Fox’s attack tools for Google Hacking level the playing field by allowing our clients to find information disclosures and exposed vulnerabilities before others do. Arm yourself with our arsenal of attack tools that leverage Google, Bing, and other popular search engines.
This research is about bypassing home and office digital physical security systems, from simple door sensors to intercepting signals from the keypad before it can alert the authorities. All the methods presented are for covert entry and leave no physical sign of entry or compromise.
The SharePoint Hacking Diggity Project is a research and development initiative dedicated to investigating the latest tools and techniques in hacking Microsoft SharePoint technologies. This project page contains downloads and links to our latest SharePoint Hacking research and free security tools. Assessment strategies are designed to help SharePoint administrators and security professionals identify common insecure configurations and exposures introduced by vulnerable SharePoint deployments.
h2cSmuggler smuggles HTTP traffic past insecure edge-server proxy_pass configurations by establishing HTTP/2 cleartext (h2c) communications with h2c-compatible back-end servers, allowing a bypass of proxy rules and access controls.
FIND OUT FIRST
Be the first to find out about latest tools, advisories, and findings.