Stowaway: Multi-hop proxy tool for security researchers and pentesters
Stowaway is Multi-hop proxy tool for security researchers and pentesters. Users can easily proxy their network traffic to intranet nodes (multi-layer). Note: The files under demo folder are Stowaway's...
View ArticleTuxResponse - Linux Incident Response
TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems and enable you to triage systems quickly, while not compromising...
View ArticleCovenant the .NET based C2 on Kali Linux | by Dan Dieterle
Covenant the .NET based C2 on Kali Linux There are many Command and Control Frameworks for Pentesters and Red Teamers to use. Covenant is a nice .NET based C2 environment that works great on Kali...
View ArticleAWS Report - a tool for analyzing amazon resources
Features Search iam users based on creation date Search buckets public Search security group with inbound rule for 0.0.0.0/0 Search elastic ip dissociated Search volumes available Search AMIs with...
View ArticleBlockchain for Business: How This Booming Technology is Benefiting...
Blockchain for Business: How This Booming Technology is Benefiting Corporations According to Deloitte’s 2018 survey of over 1,000 business executives, 39% of respondents stated their companies would...
View ArticleXposedOrNot - tool to search an aggregated repository of xposed passwords...
XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account...
View ArticleWAFW00F - The Web Application Firewall Fingerprinting Tool
How does it work? To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a...
View Articlex86/x86-64 Assembly Introduction [FREE COURSE CONTENT]
In this video from our Reverse Engineering with Ghidra course we take shot at learning the basics of x86/x86-64 Assembly. This is just the very beginning of our adventure, so we're laying sold...
View Article8 Free Tools to Automate Your Incident Response Process by Gilad David Maayan
Image Source Incident response is the organized practice of responding to cyber security events. These processes are typically organized into an incident response plan, which outlines the steps and...
View ArticleWhy Blockchain Is a Good Choice for Your Next Project by Dmitry Reshetchenko
Blockchain can drive technology change for a significant number of industries. Data consistency, transparency of the processes, and no means to make updates to the facts that have already happened are...
View ArticleIotShark - Monitoring And Analyzing IoT Traffic
IoTShark aims to provide a [nearly] fully automated solution for a user to monitor their IOT devices by simply running a single script. The user merely has to select which device they wish to monitor,...
View ArticleAttack surfaces, tools and techniques cheat sheet | by SANS
https://github.com/The-Art-of-Hacking/h4cker/blob/master/cheat_sheets/Attack-Surfaces-Tools-and-Techniques.pdf The post Attack surfaces, tools and techniques cheat sheet | by SANS appeared first on...
View ArticleIs it still safe to use the internet in 2020? by Florian Pauly
When the World Wide Web became available for public use Tim Berners-Lee had no idea of the impact it would have on the world. Today, more than 4.39 billion people use the internet and that number rises...
View ArticleSo, you want to try this 'hacking' stuff… | by Garry R
So, you want to try this 'hacking' stuff… I've been presenting a lot lately. It's always nice to educate and surprise people by showing them something they have never seen before. From brute-forcing...
View ArticleDroneSploit - A pentesting console framework dedicated to drones
This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like...
View ArticleSQL commands Cheat Sheet by Cheatography
The cheat sheet contains information gathered from various websites and was designed by the sjm user who is active at Cheatography website. In case of problems, leave us a comment or send a message....
View ArticleAaia - AWS Identity and Access Management Visualizer and Anomaly Finder
What does Aaia do? Aaia (pronounced as shown here) helps in visualizing AWS IAM and organizations in a graph format with help of Neo4j. This helps in identifying the outliers easily. Since it is based...
View ArticleTorBot - Open Source Intelligence Tool for the Dark Web
TorBot is an open source intelligence tool developed in python. The main objective of this project is to collect open data from the deep web (aka dark web) and with the help of data mining algorithms,...
View ArticlePasser - Passive service locator, a python sniffer that identifies servers,...
Passer can work off a live packet capture or from a pcap file (command line parameter, see examples below). It reports live services and clients, ethernet cards on the lan, dns entries, operating...
View ArticleMemhunter - Live Hunting Of Code Injection Techniques
Memhunter - Automated hunting of memory resident malware at scale. This project is WORK IN PROGRESS. Expect feature changes and binary releases on the upcoming weeks. Overview Memhunter is an endpoint...
View Article