BlackStone project or "BlackStone Project" is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting. In this tool we can register in the database the vulnerabilities that we find in the audit, classifying them by internal, external audit or wifi, in addition, we can put your description and recommendation, as well as the level of severity and effort for its correction. This information will then help us generate in the report a criticality table as a global summary of the vulnerabilities found. We can also register a company and, just by adding its web page, the tool will be able to find subdomains, telephone numbers, social networks, employee emails... Website: https://microjoan.com Use and installation video: https://youtu.be/qasPlaaYxiU Buy me a coffee: https://www.buymeacoffee.com/microjoan Docker Install Install Docker /bin/bash -c "$(curl -fsSL https://get.docker.com)" systemctl enable docker systemctl start docker Install....
Read the rest of this story with a free account.
Already have an account? Sign in
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR
- BlogAugust 29, 2022Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- BlogAugust 25, 2022Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky