Browsing category

Pentest

dnSpy – NET Debugger & Assembly Editor

Reverse Engineer .NET Assemblies dnSpy is a tool to reverse engineer .NET assemblies. It includes a decompiler, a debugger and an assembly editor (and more) and can be easily extended by writing your own extension. It uses dnlib to read and write assemblies so it can handle obfuscated assemblies (eg. malware) without crashing.   Features […]

Meta Twin – File Resource Cloner

The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into another. Note: The signature is added, but not valid.   ================================================================= ___ ___ ___ ______ ____ ______ __ __ ____ ____ | | | / _] | / | | || |__| || || […]

Google’s Learning Software Learns To Write Learning Software

Google lists just over 1,300 people on its research website, not all of whom specialize in AI. It has many thousands more software engineers. Google parent Alphabet has 27,169 employees engaged in research and development, according to its most recent annual financial filing. Google declined to make anyone available to discuss AutoML. Researchers outside the […]

psad – Intrusion Detection and Log Analysis with iptables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans and sweeps, backdoors, botnet command and control communications, and more. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert […]

RHAPIS – Network Intrusion Detection Systems Simulator

Network intrusion detection systems simulator. RHAPIS provides a simulation environment through which user is able to execute any IDS operation. Basic Usage Type HELP in the console in order to see the available commands. RHAPIS is written in Lua language. You need to have installed Lua in order to run RHAPIS. The first commands that […]

OnePlus Secretly Collects Way More Data Than It Should — Here’s How to Disable It

There is terrible news for all OnePlus lovers. Your OnePlus handset, running OxygenOS—the company’s custom version of the Android operating system, is collecting way more data on its users than it requires. A recent blog post published today by security researcher Christopher Moore on his website detailed the data collection practice by the Shenzhen-based Chinese […]

Qatar has blocked Skype, WhatsApp, Viber, Duo, and Facetime

The Qatar administration also told internet users that they would be reviewing the issue though no decision or official comment on the blocks themselves have reported. For a while, users were uncertain whether Skype or the ISPs at the direction of the government were the sources of the block though it is immediately 100% crystal […]

Microsoft has killed Windows Mobile

Joe Belfiore continued that he had also shifted to Android himself. Windows 10 Mobile attempted to attract users by making them run the same “universal apps” on both their PCs and handsets, but the thought failed to catch on. The OS accounted for just 0.03% of the global market based on smartphone purchases between April […]

Microsoft Cortana Can Now Read Your Skype Messages to Make Chat Smarter

Microsoft today announced built-in support for Cortana—an artificial intelligence-powered smart assistant—in Skype messenger on Android as well as iOS devices. What purpose does it serve? Microsoft wants its AI-based smart assistance to understand your conversations and help you with quick suggestions, ideas and information right inside your chat window. “Cortana can also help you organize […]

OSXAuditor – Free Mac OS X Computer Forensics Tool

OS X Auditor is a free Mac OS X computer forensics tool. OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze: the kernel extensions the system agents and daemons the third party’s agents and daemons the old and deprecated system and […]

NIELD v0.6.1 – Network Interface Events Logging Daemon

NIELD (Network Interface Events Logging Daemon) is a tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache (ARP,NDP), IP address (IPv4,IPv6), routing, FIB rules, traffic control. Download  $ git clone https://github.com/t2mune/nield.git Install $ ./configure $ make # make install Usage nield [-vh46inarft] [-p lock_file] [-s buffer_size] [-l […]

Facebook has introduced a new feature to control Fake News

If you’re one of the users Facebook has decided to participate in the test, you’ll see this small button in the upper right-hand corner above an article’s title. If you tap this button, you’ll be able to find extra contextual data about the journalist that is “pulled from across Facebook and other experts, such as […]

TV Service is being killed by Google Fiber

Last week, it was reported that the TV portion of Google Fiber is being dropped from future rollouts of the service. In a blog post, Google revealed that in its newest markets, Louisville and San Antonio, it will not be giving optional TV service. “More and more users are moving away from conventional methods of […]

Microsoft is thinking about killing Laptop and Tablet Line

However, one investigator has made the shock forecast that the end is coming soon for the Surface.Steve Brazier thinks that when 2019 comes along, Microsoft will choose to scrap the Surface product line. Mr. Brazier, the chief executive of analyst firm Canalys, made the forecast at the new Canalys Channels Forum in Venice. He said that Microsoft […]

Blisqy – Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)

A slow data siphon for MySQL/MariaDB using bitwise operation on printable ASCII characters, via a blind-SQL injection. Usage USAGE: blisqy.py –server <Web Server> –port <port> –header <vulnerable header> –hvalue <header value> –inject <point of injection> –payload <custom sql payload> –dig <yes/no> –sleeptime <default 0.5> Options: -h, –help show this help message and exit –server=WEBSERVER Specify […]

AWSBucketDump – Security Tool to Look For Interesting Files in S3 Buckets

AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. It’s similar to a subdomain bruteforcer but is made specifically for S3 buckets and also has some extra features that allow you to grep for delicious files as well as download interesting files if you’re not afraid to quickly fill up […]