Hacker TV – GoFetch

This video demonstrates how GoFetch utilizes Bloodhound attack graph data to automatically pivot from an exploited host to the domain controller.  The demonstration begins in Bloodhound, where the presenter identifies the attack path to the domain controller. After finding a path, the graph is exported for use by the attack script. The presenter then launches GoFetch Read More …

LazyOwn: CRIMEN

For offensive security experts, LazyOwn: CRIMEN is an advanced, Python-based framework meticulously designed to streamline and automate complex penetration testing and vulnerability analysis tasks, particularly for red team operations. Far more than a simple collection of scripts, LazyOwn aims to be a comprehensive toolkit, integrating a vast array of functionalities to mimic sophisticated cyber adversaries. Read More …

LLM Vulnerability Scanning with Garrick

This video provides a tutorial on using Garrick, a large language model vulnerability scanner, to test custom chat bots. Garrick employs probes (test cases) and detectors to identify vulnerabilities, drawing from a large, constantly updated probe library. The tutorial focuses on testing a simple chat application called Wy chat, which utilizes Llama 3 and the Read More …