Tools
Read blogpost about different cybersecurity tools I have used. There are several subcategories to help you find what you need.
-
Gaining access to Office 365 user data without credentials
You read the title right, there is an easy way to gain access to a user’s Office 365 mailbox, attachments,…
Read More » -
Simulating attacks and APT Groups with MITRE’s CALDERA
Thinking of good cybersecurity measures is a different ballgame than actually testing it. Often people think that having a good…
Read More » -
Veil Evasion for bypassing antivirus software
Running your awesome payload and getting it shot down by antivirus software is kind of the same as having your…
Read More » -
BadBlood: Active Directory object creator and security generator
We all know the issue. You just installed Active Directory Domain Services but everything is empty. To start testing you…
Read More » -
Shodan Eye: Search tool for Shodan
The Shodan Eye tool is part of a collection of Ethical Hacking tools written by fellow Dutchie Jolanda de Koff,…
Read More » -
TinEye Reverse image search
“Search by image and find where that image appears online”, that is the slogan of TinEye. It is a great…
Read More »