Find here the best cybersecurity tools created by Carlos Polop and use them to improve your company's security!
We need sponsorships in order to keep up to date with the latest security breaches. Helping us is actually helping yourself and the community
Even if they look adorable, these peas will expose the worst in your machine. They search for possible local privilege escalation paths that an attacker could exploit, and print them with nice colors so misconfigurations can be recognized easily! Find the one that best suits you, there are for Windows, Linux/Unix* and MacOS.
In this free book you can find hundreds of thousands (and increasing) of explained tricks to find and exploit different vulnerabilities and misconfigurations. Feel free to use it to learn more about cybersecurity, to play CTFs or for your day to day job, or for everything !
In this free book you can find hacking trick/technique/whatever related to CI/CD & Cloud I have learnt in CTFs, real life environments, and reading researches and news.
This tool fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths and dangerous permissions in the cloud/saas configurations. Note that PurplePanda searches both privileges escalation paths within a platform and across platforms.