Credential leak hunting using h8mail and the new COMB (Combination Of Many Breaches)
In this post we’re learning how to use h8mail with the Combination Of Many Breaches for efficient searching and harvesting
h8mail v2.5.5 release
Overview of h8mail v2.5.5 features - Scylla fixed, JSON output and breachdirectory.tk API integration
h8mail v2.5.4 release
Overview of h8mail v2.5.4 features - Scylla and Dehashed fixed, add spacing in results
h8mail v2.5.3 release
Overview of h8mail v2.5.3 features - IntelX.io integration - Free trial API key
Payload Delivery for DevOps : Building a Cross-Platform Dropper Using the Genesis Framework, Metasploit and Docker
Creating a modular, cross-platform payload dropper that checks the OS, and fetches the second stage payload using a single code base!
Introduction To Modern Routing For Red Team Infrastructure - using Traefik, Metasploit, Covenant and Docker
Deploy a scalable, dynamically routed Command and Control (C2) infrastructure, spawning additional routes as it grows!
Hosting and hiding your C2 with Docker and Socat
Rapidly deliver payloads from your docker-hosted MSF C2, hidden behind socat containers
Password Breaches with Docker and h8mail
Pushing all the heavy lifting of breach studies to the cloud