Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Concurrency in Golang demonstration [FREE COURSE VIDEO]

In this short video from our upcoming Pentesting with Golang online course we take a look at the concept of concurrency in Go - it's a useful feature, commonly used when programming tools - for...

View Article


Trident - Automated Password Spraying Tool

The Trident project is an automated password spraying tool developed to meet the following requirements: the ability to be deployed on several cloud platforms/execution providers the ability to...

View Article


Image may be NSFW.
Clik here to view.

Manuka - A Modular OSINT Honeypot For Blue Teamers

Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers. It creates a simulated environment...

View Article

Image may be NSFW.
Clik here to view.

Rackspace security vulnerability leaves customers open to cyberattack: SMTP...

In July 2020 7 Elements discovered a vulnerability in Rackspace that exposed all its global hosted email customers to the potential malicious use of their email domain by unauthorised actors....

View Article

kraken - Cross-platform Yara scanner written in Go Resources

Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily intended for incident response, research and ad-hoc detections (not for endpoint...

View Article


Image may be NSFW.
Clik here to view.

Hetty - An HTTP Toolkit For Security Research

Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and...

View Article

How to Use MySQL with Python by Sujith Kumar

If you're a Python Developer or someone who is trying for a database development career or want to scale up and work as a database programmer, knowing how to use MySQL with Python will be an added...

View Article

Intercepting Server Communications [FREE COURSE VIDEO]

In this short video from our Database Hacking course you will learn about intercepting server communications. We will focus on the TDS packets this time. Dive in!  This course about database pentesting...

View Article


Linux evil toolkit is a framework that aims to centralize, standardize and...

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals. LETK (Linux evil toolkit) has few simple commands, one...

View Article


Image may be NSFW.
Clik here to view.

YesWeHack releases DOJO, a training platform geared toward learning bug...

YesWeHack, European Leading Bug Bounty platform, has released "Dojo", a learning platform that helps ethical hackers develop their skills in finding security vulnerabilities. Currently, Dojo offers...

View Article

DevOps and Security: 8 Best Practices to Prioritize by Hardik Shah

Over the last two decades, the era of IT and software development has changed tremendously. The software development has progressed from the slow and rigid waterfall model to DevOps' flexible and agile...

View Article

Image may be NSFW.
Clik here to view.

osi.ig - Information Gathering Instagram

osi.ig is an Open Source Information Instagram The Instagram OSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their...

View Article

Image may be NSFW.
Clik here to view.

Xerror - automated pentesting tool

Xerror is an automated penetration tool, which will helps security professionals and nonprofessionals to automate their pentesting tasks. Xerror will perform all tests and, at the end generate two...

View Article


Image may be NSFW.
Clik here to view.

RFI/LFI Payload List

As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course, it takes a second person to have it. Now, this article will hopefully give you an idea...

View Article

ToothPicker - An In-Process, Coverage-Guided Fuzzer For iOS

ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically target iOS's Bluetooth daemon bluetoothd and to analyze various Bluetooth protocols on iOS. As it is built...

View Article


GG-AESY: Hide cool stuff in images

To start off, I highly recommend always use GG-AESY using verbose mode or very verbose mode, if you are not using this in unmanaged loaders, I also recommend always specifying an outfile. Pay attention...

View Article

Image may be NSFW.
Clik here to view.

The SOC New Normal: Hybrid and Virtual SOCs in the COVID-19 Crisis by Gilad...

Times of social disruption are prime opportunities for criminals to carry out cyberattacks. Organizations are often distracted by other pressing matters and security teams may already be overwhelmed....

View Article


Image may be NSFW.
Clik here to view.

Github Code Scanning: vulnerability scanner by Justin Hutchings

  GitHub code scanning is a developer-first, GitHub-native approach to easily find security vulnerabilities before they reach production. We’re thrilled to announce the general availability of code...

View Article

Image may be NSFW.
Clik here to view.

Karkinos - Penetration Testing and Hacking CTF's Swiss Army Knife

What is Karkinos? Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following: Encoding/Decoding characters...

View Article

Image may be NSFW.
Clik here to view.

DarkSide - Tool Information Gathering & social engineering

DarkSide is a tool with an awesome user interface. https://github.com/ultrasecurity/DarkSide Features: Hacker Dashboard Hacker News [thehackernews.com/] New Exploits [Exploit-db.com] Hacking Tutorials...

View Article
Browsing all 612 articles
Browse latest View live