Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Intercepting Mobile Traffic with Burp Suite - iPhone [FREE COURSE CONTENT]

In this course video by Atul Tiwari from his Mastering Burp Suite course, you will learn how to set up Burp Suite to intercept and analyze traffic going through a mobile device - in this case, an...

View Article


Image may be NSFW.
Clik here to view.

2019: Enterprise Mobility Trends, Challenges and the Way Forward by Scalefusion

Cell phones have become such an integral part of our everyday lives that they have a significant impact on everything we do in our personal and professional space. Today, mobility has become the...

View Article


Image may be NSFW.
Clik here to view.

R3con1z3r is a lightweight web information gathering tool with an intuitive...

R3con1z3r is a lightweight web information gathering tool with an intuitive features written in python. It provides a powerful environment in which open source intelligence (OSINT) web-based...

View Article

Image may be NSFW.
Clik here to view.

ISPY: Exploiting EternalBlue And BlueKeep Vulnerabilities With Metasploit

ispy is a Eternalblue (MS17-010) and BlueKeep (CVE-2019-0708) scanner and exploiter with Metasploit Framework. What is eternalblue: EternalBlue is a cyberattack exploit developed by the U.S. National...

View Article

Image may be NSFW.
Clik here to view.

IoT-Implant-Toolkit - Toolkit For Implant Attack Of IoT Devices

IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port...

View Article


DevSecOps: The New Security Focused Enhancement to DevOps Approach by Nathan...

In recent years, we have seen the IT infrastructure to undergo massive changes. DevSecOps approach has been at the forefront of these changes. By combining both the development and operations team,...

View Article

Image may be NSFW.
Clik here to view.

Penta - Open Source All-In-One CLI Tool To Automate Pentesting

Penta is is Pentest automation tool using Python3.It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers. Installation Install requirements: Penta...

View Article

Image may be NSFW.
Clik here to view.

Harvesting email addresses for OSINT [FREE COURSE CONTENT]

In this video from our OSINT for Hackers online course by Atul Tiwari you will learn how to use the Harvester in combination with Shodan to collect email addresses for intelligence gathering. It's a...

View Article


There Are Ways To Help Stop Cyber Bullying by Melissa Crooks

Bullying is a hurtful action that has been around forever. Today, however, these bullies have discovered they can prolong an individual’s pain by using mobile devices and the internet. It is no longer...

View Article


Image may be NSFW.
Clik here to view.

OpenCTI - Open Cyber Threat Intelligence Platform

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize...

View Article

HomePwn - Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and inside the same working environment. It is designed to find...

View Article

Why Biometric Authentication is Better than Passwords by Alex Hunter

Given the range of system logins enterprise users and customers have to access every day, the process of keying in a password over and over has become not just an inconvenience but also a security...

View Article

The United States Will Eventually Have Its Own Version of The GDPR - Here's...

By now, I imagine you’ve heard the news. California has become the first state to follow the European Union’s lead, creating a privacy framework of its own. Enforceable by 2020, the California Consumer...

View Article


Image may be NSFW.
Clik here to view.

XORpass is an encoder to bypass WAF filters using XOR operations.

Installation & Usage git clone https://github.com/devploit/XORpass cd XORpass $ php encode.php STRING $ php decode.php "XORed STRING" Example of bypass: Using clear PHP function:...

View Article

Image may be NSFW.
Clik here to view.

ezXSS - An Easy Way For Penetration Testers And Bug Bounty Hunters To Test...

Current features Some features ezXSS has Easy to use dashboard with statics, payloads, view/share/search reports and more Payload generator Instant email alert on payload Custom javascript payload...

View Article


Image may be NSFW.
Clik here to view.

IPv4 and IPv6 analysis in Wireshark [FREE COURSE CONTENT]

In this video from our Packet Analysis with Wireshark course by Atul Tiwari we learn how to perform IPv4 and IPv6 analysis in Wireshark. It's a straightforward task that's very useful in many...

View Article

Image may be NSFW.
Clik here to view.

Vulnx 🕷️ is an intelligent bot auto shell injector that detect...

Vulnx is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of CMS, fast CMS detection, informations gathering and vulnerability scanning of the target like...

View Article


Image may be NSFW.
Clik here to view.

PHP is dead…Viva le PHP! By Sergii Shanin

The fracas over Gutenberg and WordPress is the latest installment in the death of PHP. Take a deep breath everybody. Let’s ignore the trolls and take a look at what Mark Twain, Fidel Castro and PHP...

View Article

Image may be NSFW.
Clik here to view.

How and Why You Should Encrypt Your USB Data by Richard LeCount

If you deposit sensitive data on your USB stick, then you must consider encryption to secure your information in the event of a security breach or physical loss. There are a couple of different ways to...

View Article

Why Cybersecurity Needs to Remain a Top Priority For Every Company

Cybersecurity must be a top priority for every business across every industry. Through the expansion of the internet, exposure to malicious users and exploited devices has increased dramatically....

View Article
Browsing all 612 articles
Browse latest View live