Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

lazygit - A simple terminal UI for git commands written in Go

You've heard it before, git is powerful, but what good is that power when everything is so damn hard to do? Interactive rebasing requires you to edit a goddamn TODO file in your editor? Are you kidding...

View Article


Image may be NSFW.
Clik here to view.

Xencrypt - A PowerShell script anti-virus evasion tool

Xencrypt is a PowerShell crypter v 1.0. Tired of wasting lots of time obfuscating PowerShell scripts like invoke-mimikatz only to have them get detected anyway? Wouldn't it be awesome if you could take...

View Article


Image may be NSFW.
Clik here to view.

Subfinder is a subdomain discovery tool that discovers valid subdomains for...

subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. subfinder is built...

View Article

Image may be NSFW.
Clik here to view.

Final Recon - OSINT Tool for All-In-One Web Reconnaissance

Final Recon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. The tool is available in Black Arch Linux and...

View Article

Image may be NSFW.
Clik here to view.

The LAZY script will make your life easier, and of course faster

Lazy - This is a script for Kali Linux that automates many procedures about wifi penetration and hacking. I actually made it for fun for me just to save some time, but I don't mind publishing it. For...

View Article


Gadgetinspector - A Byte Code Analyzer For Finding Deserialization Gadget...

This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. By automatically discovering possible gadgets...

View Article

Image may be NSFW.
Clik here to view.

XCTR Hacking Tools - All in one for Information Gathering

Read Me Initially, you need to create a project where you will save everything. All of the collected information is saved as "project-name" in the results directory. You can update user agent and...

View Article

Image may be NSFW.
Clik here to view.

WiFi Passview - An open source batch script based WiFi Passview for Windows

WiFi Passview is an open-source batch script-based program that can recover your WiFi Password easily in seconds. This is for Windows OS only. Basically, this scripted program has the same function as...

View Article


PrivescCheck - Privilege Escalation Enumeration Script for Windows

PrivescCheck script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information that might be useful for exploitation...

View Article


Image may be NSFW.
Clik here to view.

Abaddon - makes red team operations faster, more repeatable and stealthier

Abaddon - Red team operations involve miscellaneous skills, the last several months and are politically sensitive; they require a lot of monitoring, consolidating and caution. Wavestone’s red team...

View Article

Phonia - most advanced toolkits to scan phone numbers using only free resources

Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any...

View Article

Image may be NSFW.
Clik here to view.

Ghost Framework - uses an ADB to remotely access an Android device

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android...

View Article

HoneyBot - Capture, Upload And Analyze Network Traffic

HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently, this library provides three scripts: capture-and-analyze.py - Capture on an...

View Article


Image may be NSFW.
Clik here to view.

Extended XSS Searcher and Finder - scans for different types of XSS on a list...

XSS Searcher is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker to perform not only GET but also POST requests. Additionally,...

View Article

Image may be NSFW.
Clik here to view.

Asynchronous reverse shell using the HTTP protocol.

Today there are many ways to create a reverse shell in order to be able to remotely control a machine through a firewall. Indeed, outgoing connections are not always filtered. However, security...

View Article


Image may be NSFW.
Clik here to view.

Why Hospitals Need to Focus on Cybersecurity Training by Jori Hamilton

Image Source: Pexels The medical industry has benefited greatly from technological advances. From widespread adoption of the cloud making access to patient records more efficient, to the use of...

View Article

Image may be NSFW.
Clik here to view.

Capture credentials with Wireshark [FREE COURSE CONTENT]

In this video from our ARP Poisoning course we take a look at how we can use Wireshark to capture credentials. This was part of the ARP poisoning attack we were studying in the course, but you can...

View Article


Image may be NSFW.
Clik here to view.

Why Use a Third-Party Threat Intel Platform to Enhance Cyber Defense by...

With the continued rise of new threats daily, a purely reactive approach to cybersecurity can land businesses in the latest headlines. Enterprises, big and small, would be wise to assume the worst—that...

View Article

Image may be NSFW.
Clik here to view.

TheFatRat - A Massive Exploiting Tool

TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to...

View Article

Sifter - an OSINT, recon and vulnerability scanner

Sifter is an OSINT, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote...

View Article
Browsing all 612 articles
Browse latest View live