DevAudit: Development Auditing for DevOps
DevAudit is an open-source, cross-platform, multi-purpose security auditing tool targeted at developers and DevOps practitioners that detects security vulnerabilities at multiple levels of the solution...
View ArticleSniffing GSM traffic with HackRF
GOOD LUCK!Tools used:hackrf_kalibrategnuradio-companiongr-gsmgqrxwiresharkInstall Requirements:First thing, you want to make sure you have all the required software installed, you can install most of...
View ArticleThings to do with RTL-SDR
As interest in SDR grows unabated and we continue to see ever more affordable hardware platforms, I thought it would be timely to round-up just a few of the things that it can be used for. This is by...
View ArticleDr0p1t-Framework - A framework that creates a dropper
FeaturesFramework works with Windows and LinuxDownload executable on target system and execute it silently..The executable size small compared to other droppers generated the same waySelf destruct...
View ArticlePybelt - an open source hackers tool belt complete with
A port scannerSQL injection scannerDork checkerHash crackerHash type verification toolProxy finding toolXSS scannerIt is capable of cracking hashes without prior knowledge of the algorithm, scanning...
View Articlexsscrapy - XSS/SQLi Spider
Fast, thorough, XSS/SQLi spider. Give it a URL and it'll test every link it finds for cross-site scripting and some SQL injection vulnerabilities. From within the main folder run: ./xsscrapy.py -u...
View ArticleRC-EXPLOITER v1.1.7 - resource file services exploiter
DISCLAIMER:The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior concent its ilegal and punish by law, this script as build to show...
View ArticleCertified Ethical Hacker v9 Training {Free}
This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security...
View ArticleCVE-2017-0199: Microsoft Office Word RTF RCE vulnerability
What is CVE-2017-0199?Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1,...
View ArticleLeaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs
Script kiddies and online criminals around the world have reportedly started exploiting NSA hacking tools leaked last weekend to compromise hundreds of thousands of vulnerable Windows computers exposed...
View ArticleBlindy - Simple Script for running BruteForce Blind MySql Injection
Simple script for running bruteforce blind MySql injectionThe script will run through queries listed in sets in provided file (default-queries.json as default) and try to bruteforce places with {}...
View ArticleHow to Hack Android Devices Using Metasploit
In this tutorial, I'll be teaching you how to hack Android devices such as phones and tablets using Metasploit.I'm going to be using Sana (Kali 2.0) for this tutorial, but you're welcome to use any...
View ArticleGrab Firefox Session From Flash Drive | Windows [Passwords/History]
The following code can be ran from a flashdrive as 'worm'.vbs. It will copy the user profile folder containing all information from users firefox sessions including stored passwords. Once copied, the...
View ArticleAtlassian’s HipChat hacked; user info, messages, and content possibly accessed
Atlassian's group chat platform HipChat is notifying its users of a data breach after some unknown hacker or group of hackers broke into one of its servers over the weekend and stole a significant...
View ArticleWPSeku - Simple Wordpress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.Usage _ __ ___ __ ___ ___| | ___ _ \ \ /\ / / '_ \/ __|/ _ \ |/ / |...
View ArticleKali Linux 2017.1 Release
As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools – but this release...
View ArticleNew Android Malware Infected 2 Million Google Play Store Users
Initially thought to be 600,000 users, the number of Android users who have mistakenly downloaded and installed malware on their devices straight from Google Play Store has reached 2 Million.Yes, about...
View ArticleHajime ‘Vigilante Botnet’ Growing Rapidly; Hijacks 300,000 IoT Devices Worldwide
Last week, we reported about a so-called 'vigilante hacker' who hacked into at least 10,000 vulnerable 'Internet of Things' devices, such as home routers and Internet-connected cameras, using a botnet...
View ArticleNew MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic
Many people believe that they are much less likely to be bothered by malware if they use a Mac computer, but is it really true? Unfortunately, No.According to the McAfee Labs, malware attacks on...
View Article