Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Impost3r - tool that aim to steal many kinds of linux passwords

Attackers can use Impost3r to make a trap to steal the legal user's passwords XD This tool is limited to security research and teaching, and the user bears all legal and related responsibilities caused...

View Article


Image may be NSFW.
Clik here to view.

Tangalanga: the Zoom conference scanner hacking tool

Tangalanga is a Zoom Conference scanner. This scanner will check for a random meeting id and return information if available. Usage Those are all the possible flags: tangalanga \ -token=user-token \ #...

View Article


Image may be NSFW.
Clik here to view.

Are PC Optimization Tools Safe?

Normally, I don’t pay much attention to what’s going on with my computer. After all, I have no reason to since I've never run into major PC issues. I mostly use my laptop for streaming services like...

View Article

Image may be NSFW.
Clik here to view.

Fsociety Hacking Tools Pack - A Penetration Testing Framework

Fsociety is a penetration testing system comprises of all penetration testing devices that a programmer needs. It incorporates every one of the devices associated with the Mr. Robot Series. The tool...

View Article

Image may be NSFW.
Clik here to view.

Recox - Master script for web reconnaissance

Recox v1.0 is the script that aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other than OWASP top ten. The script presents...

View Article


Cybersecurity Exposure Index: The Most Exposed Countries

New Cybersecurity Exposure Index (CEI) by password security resource, PasswordManagers.co,​ reveals which countries are the most and least exposed to cybercrime From end-point and cloud cyberattacks...

View Article

Image may be NSFW.
Clik here to view.

Buffer Overflow Shellcode [FREE COURSE CONTENT]

In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi,  we'll see how to exploit buffer overflow with shellcode. It's a simple...

View Article

Image may be NSFW.
Clik here to view.

BlackDir-Framework: Web Application Vulnerability Scanner

[1] Spider Directories [2] Find Sub Domain [3] Advanced Dorks Search [4] Scan list of Dorks [5] Scan WebSites [Xss,Sql,Html Inj] [6] Reverse Ip Lookup [7] Port Scan Installation: git clone...

View Article


Image may be NSFW.
Clik here to view.

Bandit is a tool designed to find common security issues in Python code

Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit...

View Article


MARA is a Mobile Application Reverse engineering and Analysis Framework.

MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in testing...

View Article

Image may be NSFW.
Clik here to view.

Securing Your SAP Implementation by Gilad David Maayan

SAP systems are used by many organizations to store and process significant amounts of confidential or sensitive data. This data is incredibly valuable to the organizations themselves, their customers,...

View Article

Image may be NSFW.
Clik here to view.

O.G. AUTO-RECON: Enumerate a target Based off of Nmap Results

The purpose of O.G. Auto-Recon is to automate the initial information-gathering phase and then enumerate based on those results as much as possible. This tool is intended for CTF's and can be fairly...

View Article

Image may be NSFW.
Clik here to view.

Osmedeus - Fully automated offensive security framework for reconnaissance...

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git clone https://github.com/j3ssie/Osmedeus cd Osmedeus...

View Article


Striker - Recon & Vulnerability Scanning Suite

Striker 2.0 is still in the prototype phase, which means it's not intended to be used by regular users. It has been made public for contributions to make the development faster. Usage: python3...

View Article

Image may be NSFW.
Clik here to view.

Raccoon - Offensive Security Tool for Reconnaissance and Information Gathering

Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data,...

View Article


TBomb An open-source SMS/call bomber for Linux And Termux.

Due misusing of TBomb, several API's died. Don't be afraid if you don't see all send messages. The script requires a working network connection to work. No balance will be deducted for using this...

View Article

Image may be NSFW.
Clik here to view.

BaseCrack - Best Decoder Tool For Base Encoding Schemes

BaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from the argument, multi-encoded...

View Article


Image may be NSFW.
Clik here to view.

BSF - Botnet Simulation Framework

BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings, and allow defenders to evaluate monitoring and countermeasures. Synopsis In the arms...

View Article

Image may be NSFW.
Clik here to view.

Preventing XXE Attacks [FREE COURSE CONTENT]

In this video from our  Web Apps Attack and Defense: Secure Coding our instructor Munir shows methods for preventing XXE attacks on web applications. This video assumes you know what XXE attacks are...

View Article

Image may be NSFW.
Clik here to view.

Xeexe - Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat)

Xeexe is a FUD exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed on Windows Xeexe Provides An Easy way to create Backdoors and Payload which...

View Article
Browsing all 612 articles
Browse latest View live