Link Dump

Email Spoofer | File Encryption | Proxy Check | Proxy List | Skype IP Grabber:https://orcinustech.com/web-tools/index.phpRansomware Decryptors:https://www.watchpointdata.com/ransomware-decryptorsOpen Source Cyber Security News:https://n0where.net/Secure Yourself or the Enterprise:https://decentsecurity.com/Virus Scan File or URL:https://www.virustotal.com/Hacker News:https:…

AWS Tools

Defensive:Scout2: https://github.com/nccgroup/Scout2 – Security auditing tool for AWS environments (Python)Prowler: https://github.com/toniblyx/prowler – CIS benchmarks and additional checks for security best practices in AWS (Shell Script)CloudSploit: https://github.com/cloudsploit/scans – AWS security scanning checks (NodeJS)CloudMapper: https://github.com/duo-labs/cloudmapper…

Windows 10 Privacy Hardening

I've been asked by colleagues to write down my process for hardening windows systems and share. Many of these people have extensive backgrounds in UNIX, but aren't familiar with Windows environments. This post isn't for any reason other than to make you aware of what you're being mined for. It's…

Chocolatey w/ PsExec for Patch Management

This post covers through deploying Chocolatey to enterprise network devices. The idea is to have a solution for 3rd party product patching that's both free and incredibly efficient. To start you'll need domain admin privileges and just a couple minutes.First, we'll need psexec installed on one machine within the…