Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Modlishka is a powerful and flexible HTTP reverse proxy

It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy multi-domain destination traffic, both TLS and non-TLS, over a...

View Article


Image may be NSFW.
Clik here to view.

Businesses Are Bleeding - The Global State of DNS Attacks by Marcus Bowring

Even non-security focused individuals with the most basic understanding of network technology are aware of how everything connected to the Internet uses an IP address, and how DNS is part of the...

View Article


Image may be NSFW.
Clik here to view.

Do you own the phone most targeted by hackers?

iPhone owners are 192 times more at risk to being targeted by hackers than other phone brands.  Over 48,010 Americans are searching information on how to hack an iPhone monthly. Over 10,040 Brits are...

View Article

Image may be NSFW.
Clik here to view.

Everything you need to know about offensive security by Yusuf Yeganeh

You may have heard a lot in the media and from your IT company about offensive security, and why you should be paying attention to it, and potentially finding a provider that can provide it! As with...

View Article

Image may be NSFW.
Clik here to view.

EVABS (Extremely Vulnerable Android Labs)

An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners. The effort is to introduce beginners with very...

View Article


Image may be NSFW.
Clik here to view.

Genact - a nonsense activity generator

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills with Genact. Just open a few instances of genact and...

View Article

Image may be NSFW.
Clik here to view.

Ffuf - A fast web fuzzer written in Go

A fast web fuzzer written in Go. Heavily inspired by the great projects gobuster and wfuzz. Features Fast! Allows fuzzing of HTTP header values, POST data, and different parts of URL, including GET...

View Article

Image may be NSFW.
Clik here to view.

RTTM - Real Time Threat Monitoring Tool V2.0

Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company goes unnoticed until it becomes viral in public. Thus causing...

View Article


Image may be NSFW.
Clik here to view.

The Threat Hunting Environment

You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser, scattered .txt files with data and some terminals showing up in the background? theTHE...

View Article


Image may be NSFW.
Clik here to view.

Dsiem - Security event correlation engine for ELK stack

Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system. Dsiem provides OSSIM-style correlation for normalized...

View Article

Image may be NSFW.
Clik here to view.

Python WiFi Scanner Coding [FREE COURSE CONTENT]

In this short video from our archived Wireless Security and Hacking online course you will learn how to code a simple WiFi scanner in Python. Our instructor, Mo, explains everything step by step, and...

View Article

Why Cybersecurity Will Change the Internet of Things

The Internet of Things has done something truly miraculous. It has allowed us to interact with others in ways we never thought possible before. With the Internet of Things, everything is connecting,...

View Article

Image may be NSFW.
Clik here to view.

Spraykatz - retrieve credentials on Windows machines

Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments. It simply tries to procdump machines and parse dumps remotely in...

View Article


Image may be NSFW.
Clik here to view.

BetterBackdoor - A backdoor with a multitude of features

Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these...

View Article

Customizable and Automatic API Attack Tool

Imperva customizable API attack tool takes an API specification as an input, and generates and runs attacks that are based on it as an output. The tool is able to parse an API specification and create...

View Article


Pown.js - A Security Testing An Exploitation Toolkit Built On Top Of Node.js...

Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploits, Pown.js considers frameworks to be an anti-pattern....

View Article

Image may be NSFW.
Clik here to view.

Quark Engine - An Obfuscation-Neglect Android Malware Scoring System

Quark Engine is an open source software for automating analysis of suspicious Android application. To do so it makes use of custom Dalvik Bytecode Loader and unique scoring system that detect malicious...

View Article


Image may be NSFW.
Clik here to view.

Top 10 best hacking tools of 2019

With the help of a few tools and knowledge of their true capabilities, hackers can perform security testing. While talking about hacking tools, remember that this is a wide topic and our list presents...

View Article

Hakrawler - A fast CLI web crawler for hackers

What is it? Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover: Forms Endpoints Subdomains Related domains...

View Article

Image may be NSFW.
Clik here to view.

Mapping-Injection: Just another Windows Process Injection

Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory. This can be achieved by using the Syscall MapViewOfFile2()...

View Article
Browsing all 612 articles
Browse latest View live