Credential leak hunting using h8mail and the new COMB (Combination Of Many Breaches)

In this post we’re learning how to use h8mail with the Combination Of Many Breaches for efficient searching and harvesting
Read more →

h8mail v2.5.5 release

Overview of h8mail v2.5.5 features - Scylla fixed, JSON output and breachdirectory.tk API integration
Read more →

h8mail v2.5.4 release

Overview of h8mail v2.5.4 features - Scylla and Dehashed fixed, add spacing in results
Read more →

h8mail v2.5.3 release

Overview of h8mail v2.5.3 features - IntelX.io integration - Free trial API key
Read more →

Payload Delivery for DevOps : Building a Cross-Platform Dropper Using the Genesis Framework, Metasploit and Docker

Creating a modular, cross-platform payload dropper that checks the OS, and fetches the second stage payload using a single code base!
Read more →

Introduction To Modern Routing For Red Team Infrastructure - using Traefik, Metasploit, Covenant and Docker

Deploy a scalable, dynamically routed Command and Control (C2) infrastructure, spawning additional routes as it grows!
Read more →

Hosting and hiding your C2 with Docker and Socat

Rapidly deliver payloads from your docker-hosted MSF C2, hidden behind socat containers
Read more →

h8mail v2.4 release

Overview of h8mail v2.4 features
Read more →

h8mail v2.3 release

Overview of h8mail v2.3 features
Read more →

Password Breaches with Docker and h8mail

Pushing all the heavy lifting of breach studies to the cloud
Read more →