Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Revealed: 80% of Poles unaware of how to report cybercrime!

Poland rank joint fifth, as 80% of Poleshave no idea how to report a cybercrime or illegal online behaviour Worryingly, 43% of Poles do not feel well informed about the risks of cybercrime Spanish...

View Article


Image may be NSFW.
Clik here to view.

Revealed: Poland among countries MOST sceptical about 5G

Poland rank fifth, as there are 20,510 online searches a month by Poles concerning the possible negative implications of 5G technology The United States is the most sceptical country in the world...

View Article


Image may be NSFW.
Clik here to view.

Go Phish! – by Amy Stokes-Waters

Phishing is possibly the most common type of cyberattack, being the vehicle for credential theft and malware distribution. It first appeared on the scene in the 80s and has grown exponentially since...

View Article

Image may be NSFW.
Clik here to view.

Create a fake Access Point by Anastasis Vasileiadis

Think long and hard before connecting to a free public wireless hotspot in a cafeteria, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is secure or if it could be an Evil...

View Article

Image may be NSFW.
Clik here to view.

Reverse Shell Generator by Ryan Montgomery

⚠️ BETA ⚠️ This project is in the beta phase, we will be constantly updating the main branch, if you have found any bugs or issues, please let us know via GitHub Issues and we will try our best to get...

View Article


Image may be NSFW.
Clik here to view.

Vajra – an automated web hacking framework for web applications

Table of Content About Vajra What is Vajra Key Feaures What Vajra does Installation Tools Used by Vajra Contributing License Future Plans/Under Development Credits Disclaimer FAQ Detailed insight about...

View Article

Hash Buster - Why crack hashes when you can bust them?

Features Automatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract & crack hashes from a file Can find hashes from a directory, recursively Multi-threading...

View Article

Subcert - a subdomain enumeration tool

Subcert Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Table of contents Setup Demo Contribute Contact Me Setup Step 1: Install Python...

View Article


Image may be NSFW.
Clik here to view.

I-See-You - a tool to find the location of users during social engineering or...

ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary...

View Article


Image may be NSFW.
Clik here to view.

How To Create A Cyber Security Strategy For Your Business by Christy Lawrence

Business owners with companies that rely on digital technology in accomplishing tasks should develop a cyber security strategy. Are you in the process of creating one to keep your business information...

View Article

Image may be NSFW.
Clik here to view.

Does Artificial Intelligence Aid Cybersecurity?

Artificial intelligence (AI) still has a long way to go to reach a sci-fi-level of advancement. For businesses in the digital age, however, it’s proving to be highly effective in its current state....

View Article

Image may be NSFW.
Clik here to view.

Infection Monkey - data center security testing tool

Welcome to the Infection Monkey! The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various...

View Article

Image may be NSFW.
Clik here to view.

8 Reasons Cyber Security Is Important

The world is now more reliant on technology than ever before. The emergence and growth of technology has had a positive impact on human life, but the convenience has, however, come with the risk of...

View Article


Image may be NSFW.
Clik here to view.

OnionSearch - a Python3 script that scrapes urls on different ".onion" search...

Educational purposes only OnionSearch is a Python3 script that scrapes urls on different ".onion" search engines. Prerequisite Python 3  Currently supported Search engines ahmia darksearchio onionland...

View Article

Image may be NSFW.
Clik here to view.

mongoaudit – a CLI tool for auditing MongoDB servers, detecting poor security...

mongoaudit is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing. Installing Clone this repository and run the setup: > git clone...

View Article


Cloudtopolis - a tool that allows to break hashes without the need for...

Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!). Together with Google...

View Article

Harpoon - OSINT/Threat Intelligence CLI tool

Install Requirements As a pre-requesite for Harpoon, you need to install lxml requirements, on Debian/Ubuntu : sudo apt-get install libxml2-dev libxslt-dev python3-dev. You need to have geoipupdate...

View Article


Image may be NSFW.
Clik here to view.

Fav-up – IP lookup by favicon using Shodan

Lookups for real IP starting from the favicon icon and using Shodan. Installation pip3 install -r requirements.txt Shodan API key (not the free one) Usage CLI First define how you pass the API key: -k...

View Article

Image may be NSFW.
Clik here to view.

Linux Smart Enumeration - tool for pentesting and CTFs

First, a couple of useful oneliners ;) wget "https://github.com/diego-treitos/linux-smart-enumeration/raw/master/lse.sh" -O lse.sh;chmod 700 lse.sh curl...

View Article

Image may be NSFW.
Clik here to view.

Give Us What We Want and No Computer Gets Hurt - A Quick Guide to Ransomware...

Ransomware has been around longer than you may think, with the first examples being trojan viruses created as early as 1989. And although it didn’t really take off until 2013, with CryptoLocker, this...

View Article
Browsing all 612 articles
Browse latest View live