Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Stowaway: Multi-hop proxy tool for security researchers and pentesters

Stowaway is Multi-hop proxy tool for security researchers and pentesters. Users can easily proxy their network traffic to intranet nodes (multi-layer). Note: The files under demo folder are Stowaway's...

View Article


TuxResponse - Linux Incident Response

TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems and enable you to triage systems quickly, while not compromising...

View Article


Image may be NSFW.
Clik here to view.

Covenant the .NET based C2 on Kali Linux | by Dan Dieterle

Covenant the .NET based C2 on Kali Linux There are many Command and Control Frameworks for Pentesters and Red Teamers to use. Covenant is a nice .NET based C2 environment that works great on Kali...

View Article

AWS Report - a tool for analyzing amazon resources

Features Search iam users based on creation date Search buckets public Search security group with inbound rule for 0.0.0.0/0 Search elastic ip dissociated Search volumes available Search AMIs with...

View Article

Image may be NSFW.
Clik here to view.

Blockchain for Business: How This Booming Technology is Benefiting...

Blockchain for Business: How This Booming Technology is Benefiting Corporations According to Deloitte’s 2018 survey of over 1,000 business executives, 39% of respondents stated their companies would...

View Article


Image may be NSFW.
Clik here to view.

XposedOrNot - tool to search an aggregated repository of xposed passwords...

XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account...

View Article

WAFW00F - The Web Application Firewall Fingerprinting Tool

How does it work? To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a...

View Article

Image may be NSFW.
Clik here to view.

x86/x86-64 Assembly Introduction [FREE COURSE CONTENT]

In this video from our Reverse Engineering with Ghidra course we take shot at learning the basics of x86/x86-64 Assembly. This is just the very beginning of our adventure, so we're laying sold...

View Article


Image may be NSFW.
Clik here to view.

8 Free Tools to Automate Your Incident Response Process by Gilad David Maayan

Image Source Incident response is the organized practice of responding to cyber security events. These processes are typically organized into an incident response plan, which outlines the steps and...

View Article


Image may be NSFW.
Clik here to view.

Why Blockchain Is a Good Choice for Your Next Project by Dmitry Reshetchenko

Blockchain can drive technology change for a significant number of industries. Data consistency, transparency of the processes, and no means to make updates to the facts that have already happened are...

View Article

IotShark - Monitoring And Analyzing IoT Traffic

IoTShark aims to provide a [nearly] fully automated solution for a user to monitor their IOT devices by simply running a single script. The user merely has to select which device they wish to monitor,...

View Article

Image may be NSFW.
Clik here to view.

Attack surfaces, tools and techniques cheat sheet | by SANS

https://github.com/The-Art-of-Hacking/h4cker/blob/master/cheat_sheets/Attack-Surfaces-Tools-and-Techniques.pdf The post Attack surfaces, tools and techniques cheat sheet | by SANS appeared first on...

View Article

Is it still safe to use the internet in 2020? by Florian Pauly

When the World Wide Web became available for public use Tim Berners-Lee had no idea of the impact it would have on the world. Today, more than 4.39 billion people use the internet and that number rises...

View Article


Image may be NSFW.
Clik here to view.

So, you want to try this 'hacking'​ stuff… | by Garry R

So, you want to try this 'hacking'​ stuff…  I've been presenting a lot lately. It's always nice to educate and surprise people by showing them something they have never seen before. From brute-forcing...

View Article

Image may be NSFW.
Clik here to view.

DroneSploit - A pentesting console framework dedicated to drones

This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like...

View Article


Image may be NSFW.
Clik here to view.

SQL commands Cheat Sheet by Cheatography

The cheat sheet contains information gathered from various websites and was designed by the sjm user who is active at Cheatography website. In case of problems, leave us a comment or send a message....

View Article

Image may be NSFW.
Clik here to view.

Aaia - AWS Identity and Access Management Visualizer and Anomaly Finder

What does Aaia do? Aaia (pronounced as shown here) helps in visualizing AWS IAM and organizations in a graph format with help of Neo4j. This helps in identifying the outliers easily. Since it is based...

View Article


Image may be NSFW.
Clik here to view.

TorBot - Open Source Intelligence Tool for the Dark Web

TorBot is an open source intelligence tool developed in python. The main objective of this project is to collect open data from the deep web (aka dark web) and with the help of data mining algorithms,...

View Article

Passer - Passive service locator, a python sniffer that identifies servers,...

Passer can work off a live packet capture or from a pcap file (command line parameter, see examples below). It reports live services and clients, ethernet cards on the lan, dns entries, operating...

View Article

Memhunter - Live Hunting Of Code Injection Techniques

Memhunter - Automated hunting of memory resident malware at scale. This project is WORK IN PROGRESS. Expect feature changes and binary releases on the upcoming weeks. Overview Memhunter is an endpoint...

View Article
Browsing all 612 articles
Browse latest View live