Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests. The goal is to save as much time as possible during...
View ArticleHardware analysis step-by-step [FREE COURSE CONTENT]
In this video on hardware analysis from our DVID Challenge - IoT Security course (which is BACK IN STOCK at this moment, yay!) you will learn what to do when you first get your hands on an IoT device...
View ArticleTop 10 Vulnerabilities in Mobile Applications by Atman Rathod
Top 10 Vulnerabilities That Every Mobile App Developer Should Be Concerned About Mobile apps across operating systems often remain vulnerable to certain security risks and malware attacks responsible...
View ArticleObfuscapk - A black-box obfuscation tool for Android apps
Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after...
View ArticleProject Black - Pentest/BugBounty progress control with scanning modules
Scope control, scope scanner and progress tracker for easier working on a bug bounty or pentest project. Anatoly Ivanov of Positive Technologies What is this tool for? The tools encourages more...
View ArticleQiling - Advanced Binary Emulation framework
Qiling is an advanced binary emulation framework, with the following features: Cross platform: Windows, MacOS, Linux, BSD Cross architecture: X86, X86_64, Arm, Arm64, Mips Multiple file formats: PE,...
View ArticleSubrake - A powerful Subdomain Scanner & Validator for Reconnaissance
Subrake - A Powerful Subdomain Scanner & Validator Written in sockets and requests which makes it a lot more faster and easier to manage. It works by enumerating subdomains by searching them on web...
View ArticleSD-WAN Security: A Beginner’s Guide (Infographic) by Paradyn
As the workforce trends towards becoming more mobile, many businesses are now choosing to operate many important business applications online across multiple clouds. The use of SD-WAN enables these...
View ArticleLegion - open source network penetration testing tool
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems. Legion, a...
View ArticleRaven - Linkedin Information Gathering Tool for Pentesters
Raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin. Disclaimer Please do not use this program to do...
View ArticleTunic - Install Linux from a running Windows system, without need for a live USB
Install Linux over or alongside an existing Windows install, straight from Windows, without requiring to boot from external media like a flash drive or making BIOS configuration changes. What Tunic...
View Articlemisp - A dashboard for a real-time overview of threat intelligence from MISP...
A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can be used as a real-time situational awareness tool to gather threat intelligence...
View ArticleNetdata - Real-time Performance Monitoring
Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly-optimized monitoring agent you install on all your systems and containers. Netdata...
View Articlepytm: A Pythonic framework for threat modelling
Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm can generate, a Data Flow Diagram (DFD), a Sequence Diagram and most...
View ArticleXPath Injection Tutorial [FREE COURSE CONTENT]
In this video from our Advanced SQL Injection and Data Store Attacks online course you will learn about XPATH injection, and blind XPATH injection, to use in your web application penetration testing....
View Articlehashcracker - python hash cracker
Supported hashing algorithms: SHA512, SHA256, SHA384, SHA1, MD5 Features: auto detection of hashing algorithm based on length (not recommended), bruteforce, password list Arguments: type: hash...
View ArticleXSS-Freak is an XSS scanner fully written in python3 from scratch
XSS-Freak is one of its kind since it crawls the website for all possible links and directories to expand its attack scope. Then it searches them for input tags and then launches a bunch of XSS...
View ArticleHow to hack "smasher2" on hackthebox.eu | by Davy Rogers
How to hack "smasher2" on hackthebox.eu Introduction This was a frustrating and interesting challenge, there were parts of it that I really enjoyed and found very useful, and then there were brute...
View ArticleFacial Recognition vs Facial Authentication: What’s the Difference? by Philip...
The advent of facial recognition in consumer smartphones has lead to the public’s basic level of understanding of the technology, but it’s certainly no match for the expertise in the security industry....
View ArticlePython Cheat sheet for hackers and developers
This cheat sheet is about Python. It is one of the most used high-level programming languages. Most coders prefer using Python for developing artificial intelligence and machine learning apps but...
View Article