Central InfoSec was named one of the Top 10 Security Companies.
Central InfoSec was named one of the Top 5 Cybersecurity Consulting Companies.
Penetration testing items and other recommendations from Central InfoSec.
Central InfoSec Cyber Security Predictions for 2021 exclusive interview with CIO Review.
Enjoy our free Capture The Flag which contains over 250 challenges and over 100 flags to capture.
Central InfoSec was named one of the Top 10 Most Promising Cybersecurity Consulting/Service Companies.
This script helps crack 7-Zip files including those 7-zip files that are included in the Central InfoSec CTF.
CEOs and CISOs need to consider these items to run a business more effectively and more securely.
Penetration testing, also known as pen testing, is one of the best security practices that you can take.
Improve your cybersecurity awareness program by following these seven steps.
Organizations need to take proactive actions to improve their overall security posture.
Without web application penetration testing, applications leave your organization at risk.
It is your responsibility to make sure appropriate and accurate information is communicated.
Automate the installation of Lair for red teaming and penetration testing.
Customize Kali Linux for red teaming and penetration testing.
Automate the installation of Tilix for red teaming and penetration testing.
All it takes is one employee to click a malicious link or unintentionally provide their credentials.
If you want a secure business, you must maintain it year round. You may be asking what that means.
Add Slack notifications to GoPhish phishing campaigns to harvest user credentials.
Compact items that help overcome every day problems and help in unexpected situations.
GoPhishReport creates custom phishing campaign reports from GoPhish phishing campaigns.
This physical security project brings awareness to physical security by training friends and family.
Lair Reporting converts Nmap Lair JSON exports to CSV files.
Tilix Penetration Testing Setup installs and customizes Tilix for more efficient use.
These one liners demonstrate quick and easy ways to sort IP addresses without large or complex scripts.
SubScrape automates the process of passively scraping subdomains for a given domain.
PhishLog uses a live keylogger to capture credentials and bypass two-factor authentication (2FA).
PhishCert automates the creation of a Let’s Encrypt SSL certificate using Certbot for phishing.
PhishSend sends phishing emails and tracks unique links that are clicked.
PhishReport manages phishing campaign reporting and historical metrics.
SSH Credential Harvester automates the setup of an SSH server that logs usernames and passwords.
PhishReportCS automates the reporting process for Cobalt Strike phishing campaigns.
VPN Server Setup automates the creation and configuration of an OpenVPN Server.
MailTest automates the testing of open mail relays which can be used for phishing.
PhishGen generates email addresses using names scraped from social media sites.
PhishServ automates the setup of a mail server allowing restricted relaying for phishing.
This Cobalt Strike Aggressor Script gathers additional information during phishing campaigns.
Phishing Keylogger v1 is a live keylogger that captures credentials and bypass 2FA.
Add and track custom web application issues within Burp Suite.
Automatically forward, intercept, and drop proxy requests while blocking ads and malware.