Browsing category

Pentest

unCaptcha – Low Resource Defeat of reCaptcha’s Audio Challenge

Across the Internet, hundreds of thousands of sites rely on Google’s reCaptcha system for defense against bots (in fact, Devpost uses reCaptcha when creating a new account). After a Google research team demonstrated a near complete defeat of the text reCaptcha in 2012, the reCaptcha system evolved to rely on audio and image challenges, historically more difficult […]

Tweep – An Advanced Twitter Scraping Tool

Tweep is an advanced Twitter scraping tool written in python that allows for scraping Tweets and pictures from Twitter profiles without using Twitter’s API. Benefits Some of the benefits of using Tweep vs Twitter API: Fast initial setup Can be used anonymously No rate limitations Can fetch all Tweets (Twitter API limits to last 3200 […]

Exitmap – A Fast and Modular Scanner for TOR Exit Relays

Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays: Modules can perform any TCP-based networking task like fetching a […]

If you use Canvas Image Firefox Flags your Website

Canvas fingerprinting is a byproduct of the HTML5 Canvas technology that all browser inventors attached to their browsers. As is the problem with many technologies, it can be used for great or evil, and in the case of canvas fingerprinting it is to follow users. While there is no primary option available to switch off […]

Facebook’s AI is not even as smart as a Rat said by Head of the Department

That was the information of Yann LeCun, the peak of Facebook AI Research, in a conversation with News published on Thursday. While tendencies can learn some stuff for themselves and beat people at board jokes like Go which has more possible movements than there are particles in the universe, they’re still nowhere near as rational […]

Assemblyline – Distributed File Analysis Framework

Assemblyline is a scalable distributed file analysis framework. It is designed to process millions of files per day but can also be installed on a single box. Canada’s electronic spy agency says it is taking the “unprecedented step” of releasing one of its own cyber defence tools to the public, in a bid to help companies and […]

ASLRay – Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying

Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying. Properties: ASLR bypass Cross-platform Minimalistic Simplicity Unpatchable Dependencies: Linux 2.6.12+ – will work on any x86-64 Debian-based OS BASH – the whole script Limitations: Stack needs to be executable (-z execstack) Binary has to be exploited through arguments locally (not file, socket or input) No […]

Nikto v2.1.6 – Web Server Scanner

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index […]

Government Source Code Reviews will not be permitted by McAfee Anymore

News reported in June that McAfee was amongst several Western technology organizations that had acceded in recent years to larger demands by Moscow for access to source code, the directions that control basic operations of computer equipment. The reviews, carried in secure facilities known as “clean rooms” by Russian organizations with expertise in technology testing, […]

Paskto – Passive Web Scanner

Paskto will passively scan the web using the Common Crawl internet index either by downloading the indexes on request or parsing data from your local system. URLs are then processed through Nikto and known URL lists to identify interesting content. Hash signatures are also used to identify known default content for some IoT devices or […]

Dark Web Criminals Respond to Crackdown by Going Mobile

In response to law enforcement’s increased involvement with targeting the illegal activities taking place on the Dark Web, criminals have began to use messaging apps to conduct their illicit operations. According to a threat report from IntSights Cyber Intelligence, a slew of messaging apps are being used by these Dark Web criminals including Skype, Discord, […]

Austrian Man Sentenced to Prison for Buying Dark Web Drugs

A 29 year old Austrian man will spend one year in prison for purchasing amphetamine paste on the Dark Web. The man was also charged with a few other less serious crimes connected to his Dark Web activities in other countries but those charges have been suspended with government supervision for a year. Authorities were […]

Pentest-Tools-Auto-Installer – A Simple Tool For Installing Pentest Tools And Forensic Tools On Debian / Ubuntu Based OS

A Simple tool for installing pentest tools and forensic tools on Debian / Ubuntu Based OS Tested on Linux Mint And Kali Linux How To Do ?? Change Your Privileges Terminal to Root Mode [email protected]:~$ sudo su And Then Clone This [email protected]:~# git clone https://github.com/Yukinoshita47/Pentest-Tools-Auto-Installer.git Get Inside Dir [email protected]:~# cd Pentest-Tools-Auto-Installer Give Chmod Access Level […]

Doctor Guilty of 137 Charges Related to Darknet Child Pornography

Dr. Matthew Falder, 28, of Birmingham, England is at the center of one of the most horrific crimes law enforcement has come across on the Darknet. Falder has recently plead guilty to 137 charges that include sexual exploitation and distributing child pornography. Falder was also discovered to have encouraged another man to rape a child […]

British Security Minister Says North Korea was Behind WannaCry Hack on NHS

The British government has admitted publicly for the first time that it is all but certain North Korea carried out the “WannaCry” malware attack which devastated NHS IT systems in May. A report released by the National Audit Office (NAO) on Friday found that hospital trusts were left vulnerable to the attack because basic recommendations on […]

ZeroDoor – A Script Written Lazily For Generating Cross-Platform Backdoors – Kali Linux 2017.2

Hey Guys, In this video i show you a cool script called ZeroDoor which used for Generating Cross-Platform Backdoors. ZeroDoor:https://github.com/Souhardya/Zerodoor A script written lazily for generating reverse shell backdoors on the go whenever you need without any hassle for your daily penetration needs . These backdoors are not James Bond high tech stuff but rather […]

SQLiv – Massive SQL Injection Vulnerability Scanner – Kali Linux 2017.2

Hey Guys, In this video i show you a cool tool called SQLiv which used to scan websites for sql injection. SQLiv:https://github.com/Hadesy2k/sqliv Features: multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning by providing specific domain (with crawling) reverse domain scanning both SQLi scanning and domain info checking are done […]

LokiBot Trojan Turns Itself into Ransomware If you Decide to Remove it

Security researchers from SfyLabs have detected an Android banking trojan dubbed LokiBot that transforms itself into a complete ransomware once the targeted user attempts to uninstall it from the infected device. LokiBot malware has been in the news since June and its makers have been pushing out new features almost every week. Once the malware […]

Metasploit Can Be Directly Used For Hardware Penetration Testing Now

Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate real-world attacks against software and networks . Rapid7 has added a hardware bridge to its Metasploit penetration testing framework, making it easier for users to analyze Internet of Things (IoT) devices. IoT’s growing up Vastly […]