Revealed: 80% of Poles unaware of how to report cybercrime!
Poland rank joint fifth, as 80% of Poleshave no idea how to report a cybercrime or illegal online behaviour Worryingly, 43% of Poles do not feel well informed about the risks of cybercrime Spanish...
View ArticleRevealed: Poland among countries MOST sceptical about 5G
Poland rank fifth, as there are 20,510 online searches a month by Poles concerning the possible negative implications of 5G technology The United States is the most sceptical country in the world...
View ArticleGo Phish! – by Amy Stokes-Waters
Phishing is possibly the most common type of cyberattack, being the vehicle for credential theft and malware distribution. It first appeared on the scene in the 80s and has grown exponentially since...
View ArticleCreate a fake Access Point by Anastasis Vasileiadis
Think long and hard before connecting to a free public wireless hotspot in a cafeteria, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is secure or if it could be an Evil...
View ArticleReverse Shell Generator by Ryan Montgomery
⚠️ BETA ⚠️ This project is in the beta phase, we will be constantly updating the main branch, if you have found any bugs or issues, please let us know via GitHub Issues and we will try our best to get...
View ArticleVajra – an automated web hacking framework for web applications
Table of Content About Vajra What is Vajra Key Feaures What Vajra does Installation Tools Used by Vajra Contributing License Future Plans/Under Development Credits Disclaimer FAQ Detailed insight about...
View ArticleHash Buster - Why crack hashes when you can bust them?
Features Automatic hash type identification Supports MD5, SHA1, SHA256, SHA384, SHA512 Can extract & crack hashes from a file Can find hashes from a directory, recursively Multi-threading...
View ArticleSubcert - a subdomain enumeration tool
Subcert Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Table of contents Setup Demo Contribute Contact Me Setup Step 1: Install Python...
View ArticleI-See-You - a tool to find the location of users during social engineering or...
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary...
View ArticleHow To Create A Cyber Security Strategy For Your Business by Christy Lawrence
Business owners with companies that rely on digital technology in accomplishing tasks should develop a cyber security strategy. Are you in the process of creating one to keep your business information...
View ArticleDoes Artificial Intelligence Aid Cybersecurity?
Artificial intelligence (AI) still has a long way to go to reach a sci-fi-level of advancement. For businesses in the digital age, however, it’s proving to be highly effective in its current state....
View ArticleInfection Monkey - data center security testing tool
Welcome to the Infection Monkey! The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various...
View Article8 Reasons Cyber Security Is Important
The world is now more reliant on technology than ever before. The emergence and growth of technology has had a positive impact on human life, but the convenience has, however, come with the risk of...
View ArticleOnionSearch - a Python3 script that scrapes urls on different ".onion" search...
Educational purposes only OnionSearch is a Python3 script that scrapes urls on different ".onion" search engines. Prerequisite Python 3 Currently supported Search engines ahmia darksearchio onionland...
View Articlemongoaudit – a CLI tool for auditing MongoDB servers, detecting poor security...
mongoaudit is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing. Installing Clone this repository and run the setup: > git clone...
View ArticleCloudtopolis - a tool that allows to break hashes without the need for...
Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!). Together with Google...
View ArticleHarpoon - OSINT/Threat Intelligence CLI tool
Install Requirements As a pre-requesite for Harpoon, you need to install lxml requirements, on Debian/Ubuntu : sudo apt-get install libxml2-dev libxslt-dev python3-dev. You need to have geoipupdate...
View ArticleFav-up – IP lookup by favicon using Shodan
Lookups for real IP starting from the favicon icon and using Shodan. Installation pip3 install -r requirements.txt Shodan API key (not the free one) Usage CLI First define how you pass the API key: -k...
View ArticleLinux Smart Enumeration - tool for pentesting and CTFs
First, a couple of useful oneliners ;) wget "https://github.com/diego-treitos/linux-smart-enumeration/raw/master/lse.sh" -O lse.sh;chmod 700 lse.sh curl...
View ArticleGive Us What We Want and No Computer Gets Hurt - A Quick Guide to Ransomware...
Ransomware has been around longer than you may think, with the first examples being trojan viruses created as early as 1989. And although it didn’t really take off until 2013, with CryptoLocker, this...
View Article