Concurrency in Golang demonstration [FREE COURSE VIDEO]
In this short video from our upcoming Pentesting with Golang online course we take a look at the concept of concurrency in Go - it's a useful feature, commonly used when programming tools - for...
View ArticleTrident - Automated Password Spraying Tool
The Trident project is an automated password spraying tool developed to meet the following requirements: the ability to be deployed on several cloud platforms/execution providers the ability to...
View ArticleManuka - A Modular OSINT Honeypot For Blue Teamers
Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers. It creates a simulated environment...
View ArticleRackspace security vulnerability leaves customers open to cyberattack: SMTP...
In July 2020 7 Elements discovered a vulnerability in Rackspace that exposed all its global hosted email customers to the potential malicious use of their email domain by unauthorised actors....
View Articlekraken - Cross-platform Yara scanner written in Go Resources
Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily intended for incident response, research and ad-hoc detections (not for endpoint...
View ArticleHetty - An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and...
View ArticleHow to Use MySQL with Python by Sujith Kumar
If you're a Python Developer or someone who is trying for a database development career or want to scale up and work as a database programmer, knowing how to use MySQL with Python will be an added...
View ArticleIntercepting Server Communications [FREE COURSE VIDEO]
In this short video from our Database Hacking course you will learn about intercepting server communications. We will focus on the TDS packets this time. Dive in! This course about database pentesting...
View ArticleLinux evil toolkit is a framework that aims to centralize, standardize and...
Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals. LETK (Linux evil toolkit) has few simple commands, one...
View ArticleYesWeHack releases DOJO, a training platform geared toward learning bug...
YesWeHack, European Leading Bug Bounty platform, has released "Dojo", a learning platform that helps ethical hackers develop their skills in finding security vulnerabilities. Currently, Dojo offers...
View ArticleDevOps and Security: 8 Best Practices to Prioritize by Hardik Shah
Over the last two decades, the era of IT and software development has changed tremendously. The software development has progressed from the slow and rigid waterfall model to DevOps' flexible and agile...
View Articleosi.ig - Information Gathering Instagram
osi.ig is an Open Source Information Instagram The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their...
View ArticleXerror - automated pentesting tool
Xerror is an automated penetration tool, which will helps security professionals and nonprofessionals to automate their pentesting tasks. Xerror will perform all tests and, at the end generate two...
View ArticleRFI/LFI Payload List
As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course, it takes a second person to have it. Now, this article will hopefully give you an idea...
View ArticleToothPicker - An In-Process, Coverage-Guided Fuzzer For iOS
ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically target iOS's Bluetooth daemon bluetoothd and to analyze various Bluetooth protocols on iOS. As it is built...
View ArticleGG-AESY: Hide cool stuff in images
To start off, I highly recommend always use GG-AESY using verbose mode or very verbose mode, if you are not using this in unmanaged loaders, I also recommend always specifying an outfile. Pay attention...
View ArticleThe SOC New Normal: Hybrid and Virtual SOCs in the COVID-19 Crisis by Gilad...
Times of social disruption are prime opportunities for criminals to carry out cyberattacks. Organizations are often distracted by other pressing matters and security teams may already be overwhelmed....
View ArticleGithub Code Scanning: vulnerability scanner by Justin Hutchings
GitHub code scanning is a developer-first, GitHub-native approach to easily find security vulnerabilities before they reach production. We’re thrilled to announce the general availability of code...
View ArticleKarkinos - Penetration Testing and Hacking CTF's Swiss Army Knife
What is Karkinos? Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following: Encoding/Decoding characters...
View ArticleDarkSide - Tool Information Gathering & social engineering
DarkSide is a tool with an awesome user interface. https://github.com/ultrasecurity/DarkSide Features: Hacker Dashboard Hacker News [thehackernews.com/] New Exploits [Exploit-db.com] Hacking Tutorials...
View Article