Quantcast
Browsing all 612 articles
Browse latest View live

WordPress: How to Protect Your Site When You Think It's Been Hacked by Ammar...

You're running your WordPress site like a real champ, publishing the latest blog posts, or selling lots of products. Everything is going great. All of a sudden, your site gets hacked. Before, you were...

View Article


Robber is open source tool for finding executables prone to DLL hijacking

Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. In Version 1.7 Robber doesn't require administrator rights by default because of new write permission...

View Article


Image may be NSFW.
Clik here to view.

Application Security: A Broader Perspective by Hardik Shah

Modern application come with many challenges, and security is indeed critical and often under-emphasized. Apps are the most favorable medium for cybercriminals who seek to steal the data, or breach...

View Article

Image may be NSFW.
Clik here to view.

FalconZero - A stealthy, targeted Windows Loader for delivering second-stage...

Introducing FalconZero v1.0 - a stealthy, targeted Windows Loader for delivering second-stage payloads(shellcode) to the host machine undetected - first public release version Loader/Dropper of the...

View Article

Image may be NSFW.
Clik here to view.

Proxy Cheat Sheet by James Kattler

With more cyber threats emerging and governments trying to access more information about our activity online, users turn to proxies to remain anonymous. However, mere anonymity is not the only reason...

View Article


Sniffle - A sniffer for Bluetooth 5 and 4.x LE

Sniffle has a number of useful features, including: Support for BT5/4.2 extended length advertisement and data packets Support for BT5 Channel Selection Algorithms #1 and #2 Support for all BT5 PHY...

View Article

Image may be NSFW.
Clik here to view.

What Role Does Data Destruction Play In Cybersecurity? by Daniel Santry

Photo by Icons 8 Team via Unsplash Very often in organisations, conversations about cybersecurity take the form of how they can best protect the data they keep. This can be in the form of software,...

View Article

Mouse Framework is an iOS and macOS post-exploitation framework

Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command-line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse...

View Article


Image may be NSFW.
Clik here to view.

2020’s Biggest Plague for Industries - Ransomware by Devin Smith

As time proceeded, ransomware increased exponentially and slowly its variations came to light in a different form of attacks. A ransomware attack is when a person is targeted with ransomware through...

View Article


Image may be NSFW.
Clik here to view.

NTLMRecon - A tool to enumerate information from NTLM authentication enabled...

NTLMRecon is built with flexibility in mind. Need to run recon on a single URL, an IP address, an entire CIDR range or combination of all of it all put in a single input file? No problem! NTLMRecon got...

View Article

Image may be NSFW.
Clik here to view.

DalFox - Parameter Analysis and XSS Scanning tool based on golang

DalFox - Finder of XSS, and Dal is the Korean pronunciation of the moon. What is DalFox Just, XSS scanning and parameter analysis tool. I previously developed XSpear, a ruby-based XSS tool, and this...

View Article

Image may be NSFW.
Clik here to view.

DalFox - Parameter Analysis and XSS Scanning tool based on golang

DalFox - Finder of XSS, and Dal is the Korean pronunciation of the moon. What is DalFox Just, XSS scanning and parameter analysis tool. I previously developed XSpear, a ruby-based XSS tool, and this...

View Article

Image may be NSFW.
Clik here to view.

Kaiten - A Undetectable Payload Generation

An Undetectable Payload Generation. This tool is for educational purposes only, usage of Kaiten for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not...

View Article


Image may be NSFW.
Clik here to view.

Saferwall is an open source malware analysis platform.

A hackable malware sandbox for the 21st Century - https://saferwall.com It aims for the following goals: Provide a collaborative platform to share samples among malware researchers. Acts as a system...

View Article

Image may be NSFW.
Clik here to view.

Sharingan is a recon multitool for offensive security and bug bounty

Sharingan is a recon multitool for offensive security/bug bounty This is very much a work in progress and I'm relatively new to offensive security in general so if you see something that can be...

View Article


Identity and Access Management for “Dummies” by Richard Azu

Photo by Daria Shevtsova on Unsplash Is your system and network environment being managed effectively against exponentially increasing attacks? Do you have close control over user access defined in...

View Article

GitHound - A batch-catching, pattern-matching, patch-attacking secret snatcher

GitHound pinpoints exposed API keys and other sensitive information across all of GitHub using pattern matching, commit history searching, and a unique result scoring system. GitHound has earned me...

View Article


What You Need to Know About Network Security by Richard Azu

Photo by Pixabay from Pexels Is Your Network Immune from Attacks? Network security is the practice of implementing standards to protect network systems against unauthorized access or improper...

View Article

Image may be NSFW.
Clik here to view.

ExploitDB and searchsploit [FREE COURSE CONTENT]

In this video from our OSINT for Hackers online course by Atul Tiwari you will learn how to utilize ExploitDB and searchsploit during your OSINT activities. Using databases available to you is a great...

View Article

Image may be NSFW.
Clik here to view.

Proxy.py – A lightweight, single file HTTP proxy server in python

To facilitate end-to-end testing for such scenarios, I architected a proxy infrastructure; A stripped-down version of which was a Proxy.py - lightweight HTTP proxy server in Python. Blog post:...

View Article
Browsing all 612 articles
Browse latest View live