Browsing tag

Mac

XAttacker – Website Vulnerability Scanner & Auto Exploiter

XAttacker is a Website Vulnerability Scanner & Auto Exploiter developed by Mohamed Riahi Auto Cms Detect [1] WordPress : [+] Adblock Blocker [+] WP All Import [+] Blaze [+] Catpro [+] Cherry Plugin [+] Download Manager [+] Formcraft [+] levoslideshow [+] Power Zoomer [+] Gravity Forms [+] Revslider Upload Shell [+] Revslider Dafece Ajax [+] […]

Amber – POC Reflective PE Packer

Amber is a proof of concept packer, it can pack regularly compiled PE files into reflective PE files that can be used as multi stage infection payloads. If you want to learn the packing methodology used inside the Amber check out below. PS: This is not a complete tool some things may break so take […]

Pipe Finder – Automated script to search in SMB protocol for available pipe names

Automated script to search in SMB protocol for availables pipe names. Requirements metasploit-framework wget pipe_audit_v2.rb module (https://github.com/peterpt/pipe_auditor_fb) – It will be installed on first run How to Run git clone https://github.com/peterpt/pipe_finder.git cd pipe_finder && ./pipef Screenshots     Notes: This script can be copied to a system path , it will run independently . Download […]

SSLH – Applicative Protocol Multiplexer

sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client. Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are implemented, and any other protocol that can be tested using a regular expression, can be recognised. A typical use case is to allow […]

Zeus-Scanner – Advanced Reconnaissance Utility

Zeus is an advanced reconnaissance utility designed to make web application reconnaissance simple. Zeus comes complete with a powerful built-in URL parsing engine, multiple search engine compatibility, the ability to extract URLs from both ban and webcache URLs, the ability to run multiple vulnerability assessments on the target, and is able to bypass search engine […]

ysoserial.net – Deserialization payload generator for a variety of .NET formatters

A proof-of-concept tool for generating payloads that exploit unsafe .NET object deserialization. Description ysoserial.net is a collection of utilities and property-oriented programming “gadget chains” discovered in common .NET libraries that can, under the right conditions, exploit .NET applications performing unsafe deserialization of objects. The main driver program takes a user-specified command and wraps it in […]

OpenWPM – Web Privacy Measurement Framework

Web Privacy Measurement is the observation of websites and serves to detect, characterize and quantify privacy-impacting behaviors. Applications of Web Privacy Measurement include the detection of price discrimination, targeted news articles and new forms of browser fingerprinting. Although originally focused solely on privacy violations, WPM now encompasses measuring security violations on the web as well. […]

Tweep – An Advanced Twitter Scraping Tool

Tweep is an advanced Twitter scraping tool written in python that allows for scraping Tweets and pictures from Twitter profiles without using Twitter’s API. Benefits Some of the benefits of using Tweep vs Twitter API: Fast initial setup Can be used anonymously No rate limitations Can fetch all Tweets (Twitter API limits to last 3200 […]

OWASP ZAP 2.6.0 – Penetration Testing Tool for Testing Web Applications

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use […]

OSX/Proton spreading again through supply-chain attack

During the last hours, ESET researchers noticed that Eltima, the makers of the Elmedia Player software, have been distributing a version of their application trojanized with the OSX/Proton malware on their official website. ESET contacted Eltima as soon as the situation was confirmed. Eltima was very responsive and maintained an excellent communication with us throughout the incident. Timeline […]

Apple patches bug that showed device password rather than hint

If you have updated your MacOS from the older version to MacOS High Sierra make sure you also apply the new security patch released by Apple to protect your device from third-party intrusion. As you already know, the latest version of Apple’s desktop operating system MacOS High Sierra has hit the market with a lot of new […]

Millions Of Apple MACs Are Vulnerable To EFI Firmware Attack

EFI Firmware Attack is one of the most popular and critical tips that any security expert strongly suggests to follow to avoid major computer attacks. However, even if you attempt to install any corrupted software update that comes to your system, there is a good chance that your computer will be obsolete and vulnerable. Researchers […]

Linux Doubles Its Market Share Since 2015, Windows And Mac Adoption Slows Down

We’ve been hearing the phrase “year of the Linux desktop” from times immemorial. The FOSS and Linux community tosses up this idea at the beginning of a new year and expects the Linux adoption to rise exponentially in the upcoming months. While a complete Linux dominance in the desktop scene looks like a far-fetched dream, […]

Beware! Apple Users,Undetectable Malware Targeting Mac Computers

Yes, even Mac could have viruses that could spy on their users silently. So if you have a Mac and think it is immune to malware, you’re wrong. An Undetectable Malware Targeting Mac Computers. An unusual piece of malware that can take remote control of the webcam, screen, mouse, keyboards and install other malicious software this […]