Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Two Sides of the OSINT Coin: A Tool for Hackers and Against Hackers by...

The cybersecurity and fraud world plays host to a relentless series of “cat and mouse” games between criminals and those who work to thwart their efforts.  Open source intelligence (OSINT) is a great...

View Article


Image may be NSFW.
Clik here to view.

List of Free Python Resources [Updated March 2022]

Python is considered a beginner-friendly programming language and its community provides many free resources for beginners and more advanced users. Our team had gathered the most helpful free materials...

View Article


Image may be NSFW.
Clik here to view.

How to Reduce and Secure Your Digital Footprint - infographic by Panda Security

Your digital footprint is the trail of data left behind from all your online activity. Anything you share or do online—whether visiting a website, making a purchase, or interacting on social...

View Article

Image may be NSFW.
Clik here to view.

openSquat - Domain Squatting and Phishing Watchdog

What is openSquat openSquat is an opensource Intelligence (OSINT) security tool to identify cyber squatting threats to specific companies or domains, such as: Phishing campaigns Domain squatting Typo...

View Article

Image may be NSFW.
Clik here to view.

SSRFire - an automated SSRF finder

An automated SSRF finder. Just give the domain name and your server and chill! ;) It also has options to find XSS and open redirects. Syntax ./ssrfire.sh -d domain.com -s yourserver.com -f...

View Article


CAPE - malware configuration and payload extraction

CAPE is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware unpacking and config extraction - hence its name is an acronym: 'Config And Payload Extraction'....

View Article

Sniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]

In this video from our Exploiting IoT Devices you can learn how to sniff BLE packets. Dive in!

View Article

Image may be NSFW.
Clik here to view.

Thelordseye searches and returns detailed information about devices that are...

Thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TVs, Fridges, Webcams, Traffic Lights, etc)....

View Article


Image may be NSFW.
Clik here to view.

HackBrowserData - Decrypt passwords/cookies/history/bookmarks from the browser

HackBrowserData is an open-source tool that could help you decrypt data (password|bookmark|cookie|history|credit card|downloads link) from the browser. It supports the most popular browsers on the...

View Article


Image may be NSFW.
Clik here to view.

Hetty - An HTTP Toolkit For Security Research

Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and...

View Article

Image may be NSFW.
Clik here to view.

Detect hidden surveillance cameras with your phone by Anastasis Vasileiadis

A family recently had a big surprise on their Airbnb: a hidden camera disguised as a smoke detector in the living room, monitoring their every move. Here are two ways to check for hidden cameras on...

View Article

Image may be NSFW.
Clik here to view.

Karkinos - Penetration Testing and Hacking CTF's Swiss Army Knife

What is Karkinos? Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following: Encoding/Decoding characters...

View Article

Image may be NSFW.
Clik here to view.

The intricacies of security testing with Kali Linux – interview with Daniel...

Dear Readers, today we would like you to meet one of our great authors and reviewers, Daniel W. Dieterle! Enjoy the reading.  [Hakin9 Magazine]: Hello Daniel! Thank you for agreeing to the interview!...

View Article


Process Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]

In this video from our Reverse Engineering with Ghidra online course you will see how a behavioral analysis of a malware is performed. The malicious sample in this exercise utilizes a technique called...

View Article

Image may be NSFW.
Clik here to view.

Ransomware and the IBM z/OS Mainframe, Big Iron by Paul F. Renda

Ten years ago, I would have said that it's impossible for a mainframe to become infected with ransomware. Today, I no longer feel so confident, having read a number of articles about methodologies for...

View Article


Image may be NSFW.
Clik here to view.

Octosuite - Advanced Github OSINT Framework

Simply gather OSINT on Github users and organizations like a god INSTALLATION clone project: $ git clone https://github.com/rly0nheart/octosuite.git $ cd octosuite $ pip install -r requirements.txt...

View Article

Image may be NSFW.
Clik here to view.

reNgine - An automated recon framework for web applications

An automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation, and organization, continuous monitoring,...

View Article


Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]

In this video from our Reconnaissance Masterclass you will learn how to footprint firewalls on a target. This lesson comes from Module 1, so just the start of our adventure - if you want to learn more,...

View Article

Image may be NSFW.
Clik here to view.

The Rise of Ice Phishing and Other Common Crypto Scams by Zac Amos

Enthusiasts often tout cryptocurrency as a more secure alternative to other digital payment methods. While the blockchain does have many cybersecurity advantages, it isn’t immune to hacking and scams....

View Article

Image may be NSFW.
Clik here to view.

PSRansom - PowerShell Ransomware Simulator with C2 Server

PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate the encryption process of generic ransomware in any system on any system with PowerShell...

View Article
Browsing all 612 articles
Browse latest View live