Pwndora - massive IPv4 scanner, find and analyze internet-connected devices...
Introduction Pwndora is a massive and fast IPv4 address range scanner, integrated with multi-threading. Using sockets, it analyzes which ports are open, and collects more information about targets,...
View ArticleTop Ethical Hacking Software For The Year 2022 by Harikrishna Kundariya
What was formerly considered exclusively illegal among professionals has now become a widely accepted phenomenon due to technological breakthroughs in the IT industry. Hacking can be done for malicious...
View ArticleRecoverPy - Interactively find and recover deleted or overwritten files from...
RecoverPy You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files. RecoverPy searches through every block of your partition to find your...
View ArticleLog4j Vulnerability: Why It’s So Severe and What Agencies Can Do About It by...
Photo by Nahel Abdul Hadi on Unsplash Last November, a remote code execution (RCE) vulnerability in Apache’s popular logging package Log4j was uncovered. It was privately reported to Apache after being...
View ArticleBest Free Email Services of 2022 by Vytautas Nemunaitis
It feels like you can get a free email address just about anywhere lately. From the industry giants to your ISP and cable provider - everyone wants to get you using their solution. Finding the right...
View ArticlePhant0m - Windows Event Log Killer
Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process in order to reduce resource consumption. Grouping multiple services into...
View ArticleDigital criminology in solving cybercrime by Anastasis Vasileiadis
Digital forensics is the application of research techniques to solve digital crimes, from viruses that hold your computer and ransom data to intrusions that redirect customers to alternative sites....
View ArticleWinshark - Wireshark plugin to work with Event Tracing for Windows
Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were removed from microsoft.com sites on November 25, 2019. Wireshark has...
View ArticleEmail spoofing 101 by Matteo Cosentino
Email spoofing is a technique mostly linked to malicious activities including phishing and spamming. From a formal(ish) standpoint, email spoofing is the act of sending an email with a forged sender...
View ArticleUsing AutoPWN to get a backdoor | Metasploit Tutorial [FREE COURSE CONTENT
In this video from our Client-side Attacks online course we learn how to set up AutoPWN in Metasploit to generate a malicious link and attack a browser. Dive in! In client-side exploitation, we take...
View ArticleTop 5 EDR Capabilities: Behavioral Protection, Whitelisting, Antimalware and...
What is EDR? Endpoint detection and response (EDR) solutions provide real-time continuous visibility into endpoint activity alongside automated response capabilities. Anton Chuvakin of Gartner...
View ArticleSQLRecon - a C# MS SQL toolkit designed for offensive reconnaissance and...
Description A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the wiki. Usage You can grab a copy of SQLRecon...
View ArticleScripting to find named hosts | Golang tutorial [FREE COURSE CONTENT]
Scripting is a crucial skill to make your ethical hacking more streamlined and efficient. In this video from our Pentesting with Golang online course you will see how you can write a very useful...
View ArticleAttacking Kerberos Unconstrained Delegation by Nairuz Abulhul
Trust this user/computer for delegation to any service. Delegation is the act of giving someone authority or responsibility to do something on behalf of someone else. A similar concept is applied in...
View ArticleDroopescan - a plugin-based scanner that aids security researchers in...
A plugin-based scanner that aids security researchers in identifying issues with several CMS. Usage of droopescan for attacking targets without prior mutual consent is illegal. It is the end user's...
View ArticleScrummage - tool that centralises search functionality from powerful, yet...
VERSION 3.7 https://github.com/matamorphosis/Scrummage Code efficiency enhancements and bug fixes for plugins. Significant UI/UX enhancements. Implementation of MFA. Due to the above change, if you are...
View ArticlePass The Hash Attacks in Active Directory [FREE COURSE CONTENT]
In this video from our Active Directory Red Teaming online course you will learn how to perform pass the hash attacks in Active Directory environments. Dive in!
View ArticleOpen Source Security in Azure by Gilad David Maayan
It is increasingly common to use open source components in enterprise software projects. Whatever the size of your organization, you are probably making use of open source. As companies move their...
View ArticleNetdata - Real-time Performance Monitoring
Netdata's distributed, real-time monitoring Agent collects thousands of metrics from systems, hardware, containers, and applications with zero configuration. It runs permanently on all your...
View ArticleObfuscapk - A black-box obfuscation tool for Android apps
Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after...
View Article