Modlishka is a powerful and flexible HTTP reverse proxy
It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy multi-domain destination traffic, both TLS and non-TLS, over a...
View ArticleBusinesses Are Bleeding - The Global State of DNS Attacks by Marcus Bowring
Even non-security focused individuals with the most basic understanding of network technology are aware of how everything connected to the Internet uses an IP address, and how DNS is part of the...
View ArticleDo you own the phone most targeted by hackers?
iPhone owners are 192 times more at risk to being targeted by hackers than other phone brands. Over 48,010 Americans are searching information on how to hack an iPhone monthly. Over 10,040 Brits are...
View ArticleEverything you need to know about offensive security by Yusuf Yeganeh
You may have heard a lot in the media and from your IT company about offensive security, and why you should be paying attention to it, and potentially finding a provider that can provide it! As with...
View ArticleEVABS (Extremely Vulnerable Android Labs)
An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners. The effort is to introduce beginners with very...
View ArticleGenact - a nonsense activity generator
Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills with Genact. Just open a few instances of genact and...
View ArticleFfuf - A fast web fuzzer written in Go
A fast web fuzzer written in Go. Heavily inspired by the great projects gobuster and wfuzz. Features Fast! Allows fuzzing of HTTP header values, POST data, and different parts of URL, including GET...
View ArticleRTTM - Real Time Threat Monitoring Tool V2.0
Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company goes unnoticed until it becomes viral in public. Thus causing...
View ArticleThe Threat Hunting Environment
You are a Threat Hunter. While investigating, did you find yourself with more than 20 tabs opened in your browser, scattered .txt files with data and some terminals showing up in the background? theTHE...
View ArticleDsiem - Security event correlation engine for ELK stack
Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system. Dsiem provides OSSIM-style correlation for normalized...
View ArticlePython WiFi Scanner Coding [FREE COURSE CONTENT]
In this short video from our archived Wireless Security and Hacking online course you will learn how to code a simple WiFi scanner in Python. Our instructor, Mo, explains everything step by step, and...
View ArticleWhy Cybersecurity Will Change the Internet of Things
The Internet of Things has done something truly miraculous. It has allowed us to interact with others in ways we never thought possible before. With the Internet of Things, everything is connecting,...
View ArticleSpraykatz - retrieve credentials on Windows machines
Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments. It simply tries to procdump machines and parse dumps remotely in...
View ArticleBetterBackdoor - A backdoor with a multitude of features
Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these...
View ArticleCustomizable and Automatic API Attack Tool
Imperva customizable API attack tool takes an API specification as an input, and generates and runs attacks that are based on it as an output. The tool is able to parse an API specification and create...
View ArticlePown.js - A Security Testing An Exploitation Toolkit Built On Top Of Node.js...
Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploits, Pown.js considers frameworks to be an anti-pattern....
View ArticleQuark Engine - An Obfuscation-Neglect Android Malware Scoring System
Quark Engine is an open source software for automating analysis of suspicious Android application. To do so it makes use of custom Dalvik Bytecode Loader and unique scoring system that detect malicious...
View ArticleTop 10 best hacking tools of 2019
With the help of a few tools and knowledge of their true capabilities, hackers can perform security testing. While talking about hacking tools, remember that this is a wide topic and our list presents...
View ArticleHakrawler - A fast CLI web crawler for hackers
What is it? Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover: Forms Endpoints Subdomains Related domains...
View ArticleMapping-Injection: Just another Windows Process Injection
Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory. This can be achieved by using the Syscall MapViewOfFile2()...
View Article