Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework

Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests. The goal is to save as much time as possible during...

View Article


Image may be NSFW.
Clik here to view.

Hardware analysis step-by-step [FREE COURSE CONTENT]

In this video on hardware analysis from our DVID Challenge - IoT Security course (which is BACK IN STOCK at this moment, yay!) you will learn what to do when you first get your hands on an IoT device...

View Article


Image may be NSFW.
Clik here to view.

Top 10 Vulnerabilities in Mobile Applications by Atman Rathod

Top 10 Vulnerabilities That Every Mobile App Developer Should Be Concerned About  Mobile apps across operating systems often remain vulnerable to certain security risks and malware attacks responsible...

View Article

Image may be NSFW.
Clik here to view.

Obfuscapk - A black-box obfuscation tool for Android apps

Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after...

View Article

Image may be NSFW.
Clik here to view.

Project Black - Pentest/BugBounty progress control with scanning modules

Scope control, scope scanner and progress tracker for easier working on a bug bounty or pentest project. Anatoly Ivanov of Positive Technologies What is this tool for? The tools encourages more...

View Article


Qiling - Advanced Binary Emulation framework

Qiling is an advanced binary emulation framework, with the following features: Cross platform: Windows, MacOS, Linux, BSD Cross architecture: X86, X86_64, Arm, Arm64, Mips Multiple file formats: PE,...

View Article

Image may be NSFW.
Clik here to view.

Subrake - A powerful Subdomain Scanner & Validator for Reconnaissance

Subrake - A Powerful Subdomain Scanner & Validator Written in sockets and requests which makes it a lot more faster and easier to manage. It works by enumerating subdomains by searching them on web...

View Article

Image may be NSFW.
Clik here to view.

SD-WAN Security: A Beginner’s Guide (Infographic) by Paradyn

As the workforce trends towards becoming more mobile, many businesses are now choosing to operate many important business applications online across multiple clouds. The use of SD-WAN enables these...

View Article


Image may be NSFW.
Clik here to view.

Legion - open source network penetration testing tool

Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems. Legion, a...

View Article


Image may be NSFW.
Clik here to view.

Raven - Linkedin Information Gathering Tool for Pentesters

Raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin. Disclaimer Please do not use this program to do...

View Article

Image may be NSFW.
Clik here to view.

Tunic - Install Linux from a running Windows system, without need for a live USB

Install Linux over or alongside an existing Windows install, straight from Windows, without requiring to boot from external media like a flash drive or making BIOS configuration changes. What Tunic...

View Article

Image may be NSFW.
Clik here to view.

misp - A dashboard for a real-time overview of threat intelligence from MISP...

A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can be used as a real-time situational awareness tool to gather threat intelligence...

View Article

Image may be NSFW.
Clik here to view.

Netdata - Real-time Performance Monitoring

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly-optimized monitoring agent you install on all your systems and containers. Netdata...

View Article


Image may be NSFW.
Clik here to view.

pytm: A Pythonic framework for threat modelling

Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm can generate, a Data Flow Diagram (DFD), a Sequence Diagram and most...

View Article

Image may be NSFW.
Clik here to view.

XPath Injection Tutorial [FREE COURSE CONTENT]

In this video from our Advanced SQL Injection and Data Store Attacks online course you will learn about XPATH injection, and blind XPATH injection, to use in your web application penetration testing....

View Article


Image may be NSFW.
Clik here to view.

hashcracker - python hash cracker

Supported hashing algorithms: SHA512, SHA256, SHA384, SHA1, MD5 Features: auto detection of hashing algorithm based on length (not recommended), bruteforce, password list Arguments: type: hash...

View Article

XSS-Freak is an XSS scanner fully written in python3 from scratch

XSS-Freak is one of its kind since it crawls the website for all possible links and directories to expand its attack scope. Then it searches them for input tags and then launches a bunch of XSS...

View Article


Image may be NSFW.
Clik here to view.

How to hack "smasher2"​ on hackthebox.eu | by Davy Rogers

How to hack "smasher2"​ on hackthebox.eu  Introduction This was a frustrating and interesting challenge, there were parts of it that I really enjoyed and found very useful, and then there were brute...

View Article

Image may be NSFW.
Clik here to view.

Facial Recognition vs Facial Authentication: What’s the Difference? by Philip...

The advent of facial recognition in consumer smartphones has lead to the public’s basic level of understanding of the technology, but it’s certainly no match for the expertise in the security industry....

View Article

Image may be NSFW.
Clik here to view.

Python Cheat sheet for hackers and developers

This cheat sheet is about Python. It is one of the most used high-level programming languages. Most coders prefer using Python for developing artificial intelligence and machine learning apps but...

View Article
Browsing all 612 articles
Browse latest View live