WordPress: How to Protect Your Site When You Think It's Been Hacked by Ammar...
You're running your WordPress site like a real champ, publishing the latest blog posts, or selling lots of products. Everything is going great. All of a sudden, your site gets hacked. Before, you were...
View ArticleRobber is open source tool for finding executables prone to DLL hijacking
Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. In Version 1.7 Robber doesn't require administrator rights by default because of new write permission...
View ArticleApplication Security: A Broader Perspective by Hardik Shah
Modern application come with many challenges, and security is indeed critical and often under-emphasized. Apps are the most favorable medium for cybercriminals who seek to steal the data, or breach...
View ArticleFalconZero - A stealthy, targeted Windows Loader for delivering second-stage...
Introducing FalconZero v1.0 - a stealthy, targeted Windows Loader for delivering second-stage payloads(shellcode) to the host machine undetected - first public release version Loader/Dropper of the...
View ArticleProxy Cheat Sheet by James Kattler
With more cyber threats emerging and governments trying to access more information about our activity online, users turn to proxies to remain anonymous. However, mere anonymity is not the only reason...
View ArticleSniffle - A sniffer for Bluetooth 5 and 4.x LE
Sniffle has a number of useful features, including: Support for BT5/4.2 extended length advertisement and data packets Support for BT5 Channel Selection Algorithms #1 and #2 Support for all BT5 PHY...
View ArticleWhat Role Does Data Destruction Play In Cybersecurity? by Daniel Santry
Photo by Icons 8 Team via Unsplash Very often in organisations, conversations about cybersecurity take the form of how they can best protect the data they keep. This can be in the form of software,...
View ArticleMouse Framework is an iOS and macOS post-exploitation framework
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command-line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse...
View Article2020’s Biggest Plague for Industries - Ransomware by Devin Smith
As time proceeded, ransomware increased exponentially and slowly its variations came to light in a different form of attacks. A ransomware attack is when a person is targeted with ransomware through...
View ArticleNTLMRecon - A tool to enumerate information from NTLM authentication enabled...
NTLMRecon is built with flexibility in mind. Need to run recon on a single URL, an IP address, an entire CIDR range or combination of all of it all put in a single input file? No problem! NTLMRecon got...
View ArticleDalFox - Parameter Analysis and XSS Scanning tool based on golang
DalFox - Finder of XSS, and Dal is the Korean pronunciation of the moon. What is DalFox Just, XSS scanning and parameter analysis tool. I previously developed XSpear, a ruby-based XSS tool, and this...
View ArticleDalFox - Parameter Analysis and XSS Scanning tool based on golang
DalFox - Finder of XSS, and Dal is the Korean pronunciation of the moon. What is DalFox Just, XSS scanning and parameter analysis tool. I previously developed XSpear, a ruby-based XSS tool, and this...
View ArticleKaiten - A Undetectable Payload Generation
An Undetectable Payload Generation. This tool is for educational purposes only, usage of Kaiten for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not...
View ArticleSaferwall is an open source malware analysis platform.
A hackable malware sandbox for the 21st Century - https://saferwall.com It aims for the following goals: Provide a collaborative platform to share samples among malware researchers. Acts as a system...
View ArticleSharingan is a recon multitool for offensive security and bug bounty
Sharingan is a recon multitool for offensive security/bug bounty This is very much a work in progress and I'm relatively new to offensive security in general so if you see something that can be...
View ArticleIdentity and Access Management for “Dummies” by Richard Azu
Photo by Daria Shevtsova on Unsplash Is your system and network environment being managed effectively against exponentially increasing attacks? Do you have close control over user access defined in...
View ArticleGitHound - A batch-catching, pattern-matching, patch-attacking secret snatcher
GitHound pinpoints exposed API keys and other sensitive information across all of GitHub using pattern matching, commit history searching, and a unique result scoring system. GitHound has earned me...
View ArticleWhat You Need to Know About Network Security by Richard Azu
Photo by Pixabay from Pexels Is Your Network Immune from Attacks? Network security is the practice of implementing standards to protect network systems against unauthorized access or improper...
View ArticleExploitDB and searchsploit [FREE COURSE CONTENT]
In this video from our OSINT for Hackers online course by Atul Tiwari you will learn how to utilize ExploitDB and searchsploit during your OSINT activities. Using databases available to you is a great...
View ArticleProxy.py – A lightweight, single file HTTP proxy server in python
To facilitate end-to-end testing for such scenarios, I architected a proxy infrastructure; A stripped-down version of which was a Proxy.py - lightweight HTTP proxy server in Python. Blog post:...
View Article