Security researchers have found a vulnerability in insecure edge-server configurations, which allows them to bypass proxy rules and access controls. The bypass has been tested on: HAproxy Traefik Nginx How does it work? Bishopfox provided Read more
Stop searching for your cybersecurity and cyberwarfare tools – we have listed them all down in the awesome download section of cyberwarzone.com. The latest tools, the latest gadgets and scripts all on one page.
The tools which are available for download will help you to get a better understanding of environments, and it will also allow you to take quick action and get quicker results. The download category is definitely something you want to check out.
Find original and updated publication dates of any web page. From the command-line or within Python, all the steps needed from web page download to HTML parsing, scraping, and text analysis are included. In a Read more
A Python script that uses the Impacket library to test vulnerability for the Zerologon exploit (CVE-2020-1472). It attempts to perform the Netlogon authentication bypass. The script will immediately terminate when succesfully performing the bypass, and Read more
Phishing is a form of digital scam. The word “phishing” is derived from the English word “fishing” (angling or fishing). Fraudsters mislead you with targeted fake emails. The e-mails resemble mail from well-known, and often Read more
It’s a simple script running in python that collects SSL/TLS information then it returns the group of information in JSON. It can also connect through your specified SOCKS server. One of the good things about Read more