Quantcast
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Securing Web Applications in 2022: XDR, DAST, PTaaS & More by Gilad David Maayan

What is Web Application Security? Web application security involves protecting websites and web applications from security threats, most of which are caused by vulnerabilities in web application code...

View Article


Image may be NSFW.
Clik here to view.

iKy - tool that collects information from an email and shows results in a...

Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Visit the Gitlab Page of the Project Video Demo Modules                          Installation...

View Article


DDexec - a technique to run binaries filelessly and stealthily on Linux using...

Context In Linux in order to run a program it must exist as a file, it must be accessible in some way through the file system hierarchy (this is just how execve() works). This file may reside on disk...

View Article

Image may be NSFW.
Clik here to view.

Lupo - Malware IOC Extractor and Debugging module for Malware Analysis...

Introduction Working on security incidents that involve malware, we come across situations on a regular basis where we feel the need to automate parts of the analysis process as complete manual...

View Article

Deep-Dive Analysis of Avos Locker Ransomware by Mila Bera

The days of silly malware that spewed annoying but ultimately harmless insults like that legendary “You are an idiot” trojan are behind us. Hackers are now going after the jugular, trying to strongarm...

View Article


10+ Best Software for Coding by Jessica Bullet

So you want to learn how to code programs and software, but you don’t know where to start? Or maybe you already know the basics but are curious about all the different types of software that are out...

View Article

Image may be NSFW.
Clik here to view.

Sooty - The SOC Analysts all-in-one CLI tool to automate and speed up workflow

Sooty is a tool developed with the task of aiding SOC analysts with automating part of their workflow. One of the goals of Sooty is to perform as many of the routine checks as possible, allowing the...

View Article

Image may be NSFW.
Clik here to view.

Osmedeus is a Workflow Engine for Offensive Security

What is Osmedeus? Osmedeus is a Workflow Engine for Offensive Security. It was designed to build a foundation with the capability and flexibility that allow you to automatically run your reconnaissance...

View Article


Image may be NSFW.
Clik here to view.

Mip22 An advanced phishing tool

The program is made for educational purposes only to see how the phishing method works. Any unnecessary use of the program is prohibited and the manufacturer has no responsibility for any illegal use...

View Article


Test Socket | Build a Python Powered Hacking Framework | Hakin9

This video tutorial is the first step in developing a basic port scanner and adding features. It is a part of our online course Build a Python Powered Hacking Framework by Atlas Stark. Dive in!

View Article

Image may be NSFW.
Clik here to view.

Beast Bomber - SMS bomber, email spammer, WhatsApp spammer, Telegram spammer,...

Beast Bomber in Telegram: https://t.me/beast_bomberr_bot (in development) Beast Bomber in GitLab: https://gitlab.com/ebankoff/Beast_Bomber See also: https://github.com/ebankoff/CleanerPRO Possibilities...

View Article

Image may be NSFW.
Clik here to view.

PyPhisher - Easy to use phishing tool with 65 website templates

PyPhiser is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, Github, Reddit, Gmail, and many others. Installation Install primary dependencies (git and...

View Article

Blind XSS in Practice | Advanced Bug Hunting with Burp Suite Tutorial [FREE...

In this video tutorial from our online course Advanced Bug Hunting with Burp Suite, our instructor Dhruv Kandpal will show you how to detect blind XSS vulnerabilities with help of XSS Hunter! Dive in!

View Article


Image may be NSFW.
Clik here to view.

NIPE - An engine to make Tor Network your default gateway

The Tor project allows users to surf the Internet, chat, and send instant messages anonymously through its own mechanism. It is used by a wide variety of people, companies and organizations, both for...

View Article

Image may be NSFW.
Clik here to view.

socialhunter - crawls the website and finds broken social media links that...

Crawls the given URL and finds broken social media links that can be hijacked. Broken social links may allow an attacker to conduct phishing attacks. It also can cost a loss of the company's...

View Article


Image may be NSFW.
Clik here to view.

How to Scale Your OSINT Research with Data Enrichment by Gergo Varga

Open source intelligence provides a rich treasure-trove of freely available data. It’s possible to tap into it with nothing more than a web browser and a search engine.  A data point such as an email...

View Article

VAmPI - Vulnerable REST API with OWASP top 10 vulnerabilities for security...

VAmPI is a vulnerable API made with Flask and it includes vulnerabilities from the OWASP top 10 vulnerabilities for APIs. It was created as I wanted a vulnerable API to evaluate the efficiency of tools...

View Article


Image may be NSFW.
Clik here to view.

Adalanche: Active Directory ACL Visualizer and Explorer

Adalanche gives instant results, showing you what permissions users and groups have in an Active Directory. It is useful for visualizing and exploring who can take over accounts, machines, or the...

View Article

AWS Lambda for Go

Libraries, samples, and tools to help Go developers develop AWS Lambda functions. To learn more about writing AWS Lambda functions in Go, go to the official documentation Getting Started // main.go...

View Article

Image may be NSFW.
Clik here to view.

WEF - WiFi Exploitation Framework

A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, Bluetooth hacking, and much more. I recommend you my alfa...

View Article
Browsing all 612 articles
Browse latest View live