Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

HackTools - The all-in-one Red Team extension for Web Pentester

HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells, and much...

View Article


Image may be NSFW.
Clik here to view.

Bluescan - A powerful Bluetooth scanner for scanning BR/LE devices, LMP, SDP,...

Bluescan is an open source project by Sourcell Xu from DBAPP Security HatLab. Anyone may redistribute copies of bluescan to anyone under the terms stated in the GPL-3.0 license. Aren't the previous...

View Article


Image may be NSFW.
Clik here to view.

iblessing - iOS security exploiting toolkit for hackers and pentesters

iblessing is iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis.iblessing is based on unicorn engine and capstone engine....

View Article

Geo-Recon - An OSINT CLI Tool Desgined To Fast Track IP Reputation And...

Geo-Recon is an OSINT CLI tool designed to fast track IP Reputation and Geo-location lookup for Security Analysts. Setup This tool is compatible with: Any Linux Operating System (Debian, Ubuntu,...

View Article

Image may be NSFW.
Clik here to view.

h4rpy - an automated WPA/WPA2 PSK attack tool

h4rpy provides a clean interface for automated cracking of WPA/WPA2 PSK networks. h4rpy enables monitor mode on a selected wireless interface, scans the wireless space for access points, tries to...

View Article


Image may be NSFW.
Clik here to view.

A Closer Look at OWASP Top 10 by Ilai Bavati

OWASP top 10 is a document that prioritized vulnerabilities, provided by the Open Web Application Security Project (OWASP) organization. OWASP is a non-profit dedicated to improving software security....

View Article

Image may be NSFW.
Clik here to view.

Autovpn - Create On Demand Disposable OpenVPN Endpoints On AWS

Autovpn is a script that allows the easy creation of OpenVPN endpoints in any AWS region. Creating a VPN endpoint is done with a single command that takes ~3 minutes. It will create the proper security...

View Article

bbrecon (Bug Bounty Recon) - Python library and CLI for the Bug Bounty Recon API

Bug Bounty Recon (bbrecon) is a free Recon-as-a-Service for bug bounty hunters and security researchers. The API aims to provide a continuously up-to-date map of the Internet "safe harbor" attack...

View Article


Image may be NSFW.
Clik here to view.

Browsertunnel - Surreptitiously exfiltrate data from the browser over DNS

Browsertunnel is a tool for exfiltrating data from the browser using the DNS protocol. It achieves this by abusing  dns-prefetch, a feature intended to reduce the perceived latency of websites by doing...

View Article


Wmihacker - A Bypass Anti-virus Software Lateral Movement Command Execution Tool

Bypass anti-virus software lateral movement command execution test tool(No need 445 Port) Introduction: The common WMIEXEC, PSEXEC tool execution command is to create a service or call...

View Article

Image may be NSFW.
Clik here to view.

HTTP-revshell - Powershell reverse shell using HTTP/S protocol with AMSI...

HTTP-revshell is a tool focused on red team exercises and pentesters. This tool provides a reverse connection through the HTTP/s protocol. It uses a covert channel to gain control over the victim...

View Article

Image may be NSFW.
Clik here to view.

Shared vs Dynamic Linking in Reverse Engineering [FREE COURSE VIDEO]

In this video from our Reverse Engineering with Ghidra online course we want to show you how to deal with shared vs dynamic linking in your reverse engineering tasks. We're using Ghidra as our main...

View Article

Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From...

This repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows Active Directory Domain. The difference from other common implementations is that we are...

View Article


CRLFuzz - A fast tool to scan CRLF vulnerability written in Go

Installation from Binary The installation is easy. You can download a prebuilt binary from the releases page, unpack and run! or with ▶ curl -sSfL http://git.io/get-crlfuzz | sh -s -- -b /usr/local/bin...

View Article

Image may be NSFW.
Clik here to view.

Ranked: The European countries most at risk of RDP Brute-Force attacks

The number of people working from home has risen astronomically this year due to Covid-19. Consequently, numerous companies have been reliant on remote desktop connections to enable their employees to...

View Article


Image may be NSFW.
Clik here to view.

Moriarty Project - This tool gives information about the phone number that...

What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about the phone number that you provided; ->Tries To Find Owner Of The Number...

View Article

Image may be NSFW.
Clik here to view.

GRAT2 - Command and Control (C2) tool written in python3 and the client in...

GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.0. The main idea came from Georgios Koumettou who initiated the project. Why we developed GRAT2? We are aware that...

View Article


List of Free Python Resources [Updated September 2020]

Python is considered as a beginner-friendly programming language and its community provides many free resources for beginners and more advanced users. Our team had gathered the most helpful free...

View Article

Image may be NSFW.
Clik here to view.

Winshark - Wireshark plugin to work with Event Tracing for Windows

Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were removed from microsoft.com sites on November 25, 2019. Wireshark has...

View Article

Image may be NSFW.
Clik here to view.

VMPDump - A dynamic VMP dumper and import fixer, powered by VTIL.

A dynamic VMP dumper and import fixer, powered by VTIL. Works for VMProtect 3.X x64. Before vs After Usage VMPDump.exe <Target PID> "<Target Module>" [-ep=<Entry Point RVA>]...

View Article
Browsing all 612 articles
Browse latest View live