The Two Sides of the OSINT Coin: A Tool for Hackers and Against Hackers by...
The cybersecurity and fraud world plays host to a relentless series of “cat and mouse” games between criminals and those who work to thwart their efforts. Open source intelligence (OSINT) is a great...
View ArticleList of Free Python Resources [Updated March 2022]
Python is considered a beginner-friendly programming language and its community provides many free resources for beginners and more advanced users. Our team had gathered the most helpful free materials...
View ArticleHow to Reduce and Secure Your Digital Footprint - infographic by Panda Security
Your digital footprint is the trail of data left behind from all your online activity. Anything you share or do online—whether visiting a website, making a purchase, or interacting on social...
View ArticleopenSquat - Domain Squatting and Phishing Watchdog
What is openSquat openSquat is an opensource Intelligence (OSINT) security tool to identify cyber squatting threats to specific companies or domains, such as: Phishing campaigns Domain squatting Typo...
View ArticleSSRFire - an automated SSRF finder
An automated SSRF finder. Just give the domain name and your server and chill! ;) It also has options to find XSS and open redirects. Syntax ./ssrfire.sh -d domain.com -s yourserver.com -f...
View ArticleCAPE - malware configuration and payload extraction
CAPE is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware unpacking and config extraction - hence its name is an acronym: 'Config And Payload Extraction'....
View ArticleSniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]
In this video from our Exploiting IoT Devices you can learn how to sniff BLE packets. Dive in!
View ArticleThelordseye searches and returns detailed information about devices that are...
Thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TVs, Fridges, Webcams, Traffic Lights, etc)....
View ArticleHackBrowserData - Decrypt passwords/cookies/history/bookmarks from the browser
HackBrowserData is an open-source tool that could help you decrypt data (password|bookmark|cookie|history|credit card|downloads link) from the browser. It supports the most popular browsers on the...
View ArticleHetty - An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and...
View ArticleDetect hidden surveillance cameras with your phone by Anastasis Vasileiadis
A family recently had a big surprise on their Airbnb: a hidden camera disguised as a smoke detector in the living room, monitoring their every move. Here are two ways to check for hidden cameras on...
View ArticleKarkinos - Penetration Testing and Hacking CTF's Swiss Army Knife
What is Karkinos? Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following: Encoding/Decoding characters...
View ArticleThe intricacies of security testing with Kali Linux – interview with Daniel...
Dear Readers, today we would like you to meet one of our great authors and reviewers, Daniel W. Dieterle! Enjoy the reading. [Hakin9 Magazine]: Hello Daniel! Thank you for agreeing to the interview!...
View ArticleProcess Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]
In this video from our Reverse Engineering with Ghidra online course you will see how a behavioral analysis of a malware is performed. The malicious sample in this exercise utilizes a technique called...
View ArticleRansomware and the IBM z/OS Mainframe, Big Iron by Paul F. Renda
Ten years ago, I would have said that it's impossible for a mainframe to become infected with ransomware. Today, I no longer feel so confident, having read a number of articles about methodologies for...
View ArticleOctosuite - Advanced Github OSINT Framework
Simply gather OSINT on Github users and organizations like a god INSTALLATION clone project: $ git clone https://github.com/rly0nheart/octosuite.git $ cd octosuite $ pip install -r requirements.txt...
View ArticlereNgine - An automated recon framework for web applications
An automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation, and organization, continuous monitoring,...
View ArticleFootprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]
In this video from our Reconnaissance Masterclass you will learn how to footprint firewalls on a target. This lesson comes from Module 1, so just the start of our adventure - if you want to learn more,...
View ArticleThe Rise of Ice Phishing and Other Common Crypto Scams by Zac Amos
Enthusiasts often tout cryptocurrency as a more secure alternative to other digital payment methods. While the blockchain does have many cybersecurity advantages, it isn’t immune to hacking and scams....
View ArticlePSRansom - PowerShell Ransomware Simulator with C2 Server
PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate the encryption process of generic ransomware in any system on any system with PowerShell...
View Article