Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Tools

  1. Home
  2. Tools

Category: Tools

Artificial Intelligence Cybersecurity Phishing Security Testing Tech Tools

Autonomous AI Pen Testing: When Your Security Tools Start Thinking for Themselves

As we navigate the evolving cybersecurity landscape of 2025, autonomous AI penetration testing stands at the fascinating intersection of artificial intelligence and security assessment. According […]

January 24, 2025January 27, 2025
0
Cybersecurity Phishing Security Testing Social Engineering Tech Tools

HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data Protection

As digital transformation picks up speed, the amount of sensitive patient information being created and stored is growing rapidly. But many healthcare organizations are struggling […]

January 21, 2025January 27, 2025
0
Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges- Blog-featured Image
Cybersecurity Phishing Security Testing Social Engineering Tech Tools

Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!

Artificial Intelligence is spreading its influence far and wide, impacting nearly every aspect of our lives, including cybersecurity. But let’s face it- AI isn’t flawless. […]

January 16, 2025January 23, 2025
0
Penetration Testing Research Tools

Bypassing Detection for a Reverse Meterpreter Shell

This post discusses the creation of an executable which spawns a reverse Meterpreter shell. All the tools used in this post are publicly available. In […]

June 11, 2018January 18, 2025
5
Research Tools Uncategorized

Ransomware Simulation

Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War Ransomware have gained much notoriety […]

May 22, 2018January 21, 2025
0
Case Studies Hacks Penetration Testing Security Testing Tools

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop […]

May 21, 2018January 21, 2025
17
Fundamentals Hacks Incident Response Malware Analysis Tools Uncategorized

Reverse Engineering For Beginners – XOR encryption – Windows x64

Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This […]

May 10, 2018January 21, 2025
0
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 Basics – Linux on ARM64

As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]

April 30, 2018January 18, 2025
0
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Windows

Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]

April 23, 2018January 18, 2025
1
Fundamentals Hacks Incident Response Malware Analysis Research Tools Uncategorized

Reverse Engineering x64 for Beginners – Linux

Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]

April 23, 2018January 18, 2025
3
  • 1
  • 2
  • 3
  • 4

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top