Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

GooFuzz - The Power of Google Dorks

Credits Author: M3n0sD0n4ld Twitter: @David_Uton Description: GooFuzz is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or...

View Article


Dark Web Search | Practical OSINT and SOCMINT Techniques [FREE COURSE CONTENT]

In this video tutorial, you will see the introduction to Dark Web searching. It is a part of our online course Practical OSINT and SOCMINT Techniques by Saeed Dehqan. Join now!

View Article


Image may be NSFW.
Clik here to view.

IPS vs. IDS: 5 Differences and How to Choose by Gilad David Maayan

What Is IDS (Intrusion Detection System) and How Does It Work? An intrusion detection system (IDS) is a network security solution that monitors traffic for suspicious activity and alerts security teams...

View Article

Casper-fs is a Custom Hidden Linux Kernel Module Generator

Casper-fs is a custom Linux Kernel Module generator to work with resources to protect or hide a custom list of files. Each LKM has resources to protect or hide files following a custom list in the YAML...

View Article

Image may be NSFW.
Clik here to view.

Blackbird - An OSINT tool to search for accounts by username in social networks

The Lockheed SR-71 "Blackbird" is a long-range, high-altitude, Mach 3+ strategic reconnaissance aircraft developed and manufactured by the American aerospace company Lockheed Corporation....

View Article


Brute-Forcing Two-Factor Authentication | Exploiting Authentication and...

In this video tutorial, you will see how to bypass multi-factor authentication with brute-force attacks. It is a part of our online course 'Exploiting Authentication and Access Control Mechanisms with...

View Article

Image may be NSFW.
Clik here to view.

How To Protect Your Affiliate Website From Security Threat

If you have an affiliate website, you know that it can be a significant source of revenue. But you may not realize that your website is also a potential liability if it isn’t adequately protected from...

View Article

Image may be NSFW.
Clik here to view.

Uncovering Data From Phone Numbers by Greg Varga

Before Googling movie trivia to prove friends and loved ones wrong, before Facebook stalking, before the internet was even available in your home, the primary source of OSINT – Open Source Intelligence...

View Article


Image may be NSFW.
Clik here to view.

AllHackingTools - a system designed to automate the download process and...

• License • Issues • Project • Wikipedia • AllHackingTools: is a system designed to automate the download process and install various tools for penetration testing. Hi, if you want to set up a Termux...

View Article


Image may be NSFW.
Clik here to view.

Importance of Risk Management Techniques in Ethical Hacking by Akhila Nasneem

Modern technology uses the term “hacking” to describe expert programmers breaking into the computers of targeted organizations or individuals. The attackers exploit weak security or plant bugs,...

View Article

Image may be NSFW.
Clik here to view.

BlackStone Project - Pentesting Reporting Tool

BlackStone project or "BlackStone Project" is a tool created in order to automate the work of drafting and submitting a report on audits of ethical hacking or pentesting. In this tool we can register...

View Article

Image may be NSFW.
Clik here to view.

pamspy - Credentials Dumper for Linux using eBPF

pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside the PAM (Pluggable Authentication...

View Article

Image may be NSFW.
Clik here to view.

OpenCTI - Open Cyber Threat Intelligence Platform

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize...

View Article


Image may be NSFW.
Clik here to view.

Evil-WinRM: The ultimate WinRM shell for hacking/pentesting

Description & Purpose This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP...

View Article

Image may be NSFW.
Clik here to view.

navi - An interactive cheatsheet tool for the command-line

navi allows you to browse through cheatsheets (that you may write yourself or download from maintainers) and execute commands. Suggested values for arguments are dynamically displayed in a list. Pros...

View Article


Image may be NSFW.
Clik here to view.

Glances - A top/htop alternative for GNU/Linux, BSD, MacOS and Windows

Glances is a cross-platform monitoring tool that aims to present a large amount of monitoring information through a curse or Web-based interface. The information dynamically adapts depending on the...

View Article

Image may be NSFW.
Clik here to view.

Genact - a nonsense activity generator

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills. Just open a few instances of genact and watch the show....

View Article


Image may be NSFW.
Clik here to view.

ffuf - Fuzz Faster U Fool

Sponsors Official Discord Channel ffuf has a channel at Porchetta Industries Discord server alongside of channels for many other tools. Come to hang out & to discuss about ffuf, its usage, and...

View Article

Hakrawler - A fast CLI web crawler for hackers

Fast golang web crawler for gathering URLs and JavaScript file locations. This is basically a simple implementation of the awesome Gocolly library. Example usages Single URL: echo https://google.com |...

View Article

Image may be NSFW.
Clik here to view.

hoaxshell - An unconventional Windows reverse shell, currently undetected by...

Purpose hoaxshell is an unconventional Windows reverse shell, currently undetected by Microsoft Defender and possibly other AV solutions as it is solely based on http(s) traffic. The tool is easy to...

View Article
Browsing all 612 articles
Browse latest View live