full screen background image
Search
Monday 22 January 2018
  • :
  • :

Archives post

FinTech Glossary – Infographic

FinTech Glossary (Infographic by Barchart On Demand) Source: https://www.linkedin.com/feed/update/urn:li:activity:6350723659296047105

Pocsuite: open-sourced remote vulnerability testing framework

Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec Security...

Beware of Cryptocurrency Mining Virus Spreading Through Facebook Messenger

If you receive a video file (packed in zip archive) sent by someone (or your friends) on your Facebook messenger — just don’t click on...

goWAPT: Go Web Application Penetration Test

GOWAPT (Go Web Application Penetration Test) is the younger brother of wfuzz a swiss army knife of WAPT, it allows pentester to perform...

XAttacker – Website Vulnerability Scanner & Auto Exploiter

XAttacker is a Website Vulnerability Scanner & Auto Exploiter developed by Mohamed Riahi Installation git clone...

How to Detect NMAP Scan Using Snort

Today we are going to discuss how to Detect NMAP scan using Snort but before moving ahead kindly read our privious both articles releted to...

Pirate Bay: Η αστυνομία της Σουηδίας στον έλεγχο των domains

Οι αστυνομικές αρχές της Σουηδίας υπέβαλαν επίσημη αίτηση στον καταχωρητή...

Loapi Cryptocurrency Mining Malware Can Really Destroy Your Phone!

Security researchers from Kaspersky have discovered a new malware that is targeting Android phones. This malware, called as Loapi, is a...

AnubisSpy Malware: Stealing photos, videos & spying on Android users

Android devices seem to be the most preferred target for hackers as there have so far been multiple incidents involving malware, ransomware...

NoSQL Exploitation Framework 2.0 – A Framework For NoSQL Scanning and Exploitation

A FrameWork For NoSQL Scanning and Exploitation Framework Authored By Francis Alexander. Added Features: First Ever Tool With Added Support...

WhatWaf – Detect And Bypass Web Application Firewalls And Protection Systems

WhatWaf is an advanced firewall detection tool who’s goal is to give you the idea of “There’s a WAF?”. WhatWaf...

JexBoss – JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool

JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks,...

mimikatz 2.1.1 – A Post-Exploitation Tool to Extract Plaintexts Passwords, Hash, PIN Code from Memory

  Mimikatz is a post-exploitation tool written by Benjamin Delpy (gentilkiwi). After the initial exploitation phase, attackers may...

Hackers leak personal videos of WWE Diva Paige

Last month, Paige whose real name is Saraya-Jade Bevis came in news for her return to the WWE (World Wrestling Entertainment). But...

Makin – Reveal Anti-Debugging Tricks

makin is to make initial malware assessment little bit easier, It helps to reveal a debugger detection techniques used by a sample....

GOWPT – Go Web Application Penetration Test

GOWPT is the younger brother of wfuzz a swiss army knife of WAPT, it allow pentester to perform huge activity with no stress at all, just...

Understating Guide of Windows Security Policies and Event Viewer

Hello friends! This article will be helpful to considerate the importance of event viewer and how to read the logs generated by event view...

Firewall Bursting: A New Approach to Better Branch Security

One of the most common network security solutions is the branch firewall. Branch firewall appliances can pack into a single device a wide...

11+ infected files from one .exe- Malware research

“I do not think the file is infected …” All of these are a part of the extracted files from a downloaded file. All .exe...

Zealot Campaign leverages NSA exploits to deliver Monero miners of both Windows and Linux servers

Security researchers spotted a sophisticated malware campaign, tracked as Zealot campaign targeting Linux and Windows servers to install...

Monero & Stealer binded in the same file.

Looks like someone really wants a lot from the victims. Files with more than one malware. As usual found on an illegal forum. Have fun...

Unfinished Paypal phishing page?

I’m starting to stop trusting hackers … How to start sharing it… if is not done yet ….. or are you just modifying...

Researchers discovered two serious code execution flaws in vBulletin not yet unpatched

Two code execution vulnerabilities affecting version 5 of the vBulletin forum software were disclosed by researchers last week. Two code...

Configure Snort in Ubuntu (Easy Way)

In our previous article we had discussed “Manually Snort Installation” in your system but there is another method also available by...

Wazuh – Open Source Host and Endpoint Security

Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application...

Crunch-Cracker – Generate Wordlists and crack Wifi (WEP, WPA/WP2)

Generate a Wordlist and crack Wifi (WEP, WPA/WP2). Wordlist generator and Wifi Cracker Crunch-Cracker 1.0 beta Function crunch simple...

Post Exploitation for Remote Windows Password

In this article you will leran how to extract Windows users password and change extracted password using metasploit framework. Here you...

Parrot Security 3.10 – Security Oriented GNU/Linux Distribution

  Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind. It includes a full portable laboratory for...

Lazarus APT Group targets a London cryptocurrency company

Security experts from Secureworks revealed the Lazarus APT group launched a spearphishing campaign against a London cryptocurrency...

The cybersecurity firm Fox-IT disclosed a security breach that affected its infrastructure

For Fox-IT disclosed a security breach that affected its infrastructure and demonstrated how to manage it in an outstanding way. The...