full screen background image
Search
Monday 22 January 2018
  • :
  • :

Lynis 2.5.9 – Security Auditing Tool for Unix/Linux Systems

  We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis....

OSX/MAMI: Εμφανίστηκε νέο malware για macOS

Η γενική αντίληψη για τις συσκευές της Apple είναι ότι προστατεύονται από...

Operator of hacked password service Leakedsource.com arrested

On January 27, 2017, the breach notification and password service Leakedsource.com went offline without stating any obvious reason. At the...

sdrtrunk – Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR)

A cross-platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using...

Forensic Investigation of Nmap Scan using Wireshark

Hello friends!! Today we are discussing about how to read hexadecimal bytes from an IP Packet that help a network admin to identify various...

chaiOS “Text Bomb” Can Freeze & Crash Your iPhone

A software developer Abraham Masri has managed to identify a new iMessage bug dubbed as chaiOS, which can infect Apple’s iPhone and Mac...

Post Exploitation in Windows using dir Command

In this article you will learn how to use Windows Command Line Command “dir” and extract files, get information about Number of files...

Η Intel αναφέρει ότι τα patches για Meltdown / Specter προκαλούν θέματα εκκίνησης σε υπολογιστές με νεότερους επεξεργαστές

Όπως αναφέρθηκε την περασμένη εβδομάδα, η ενημερωμένη έκδοση κώδικα για τα...

Forensic Data Carving using Foremost

Foremost is a program that is used to carve data from disk image files, it is an extremely useful tool and very easy to use. For the...

2x Bitcoin scam – The magic application.

People still want to believe that the money are made easy with some application and without doing anything. Click a button and you get...

Meltdown και Spectre: Τι κρύβουν για τις ευπάθειες;

Εμπειρογνώμονες στην ασφάλεια των επεξεργαστών, συμπεριλαμβανομένου και...

BlackWallet hacked: Hackers replace DNS server, steal $400k in Stellar

As the price of Bitcoin and other cryptocurrencies is surging, the cybercriminal community is exploring the opportunity to steal user funds...

Cloud : Αποθήκευση online ή ασφαλή αποθήκευση;

Cloud: Υπάρχουν μερικοί που αποφεύγουν να βάζουν δεδομένα τους στο σύννεφο,...

Νέο link ρίχνει συσκευές της Apple (iPhone, MacOS)

Προβλήματα σε συσκευές της Apple: Ένα νέο σφάλμα που επηρεάζει εφαρμογές...

sqli-hunter: simple sqlmap api wrapper and proxy server

SQLi-Hunter SQLi-Hunter is a simple HTTP proxy server and a sqlmap api wrapper that makes dig SQLi easily. Installation Requirement Ruby:...

Skygofree — Powerful Android Spyware Discovered

Security researchers have unveiled one of the most powerful and highly advanced Android spyware tools that give hackers full control of...

swf_json_csrf: simplify the SWF-based JSON CSRF exploitation

swf_json_csrf This repository was created to simplify the SWF-based JSON CSRF exploitation. It should work also with XML (and any other)...

cSploit Android – The most complete and advanced IT security professional toolkit on Android

cSploit is a free/libre and open source (GPLed) Android network analysis and penetration suite which aims to be the most complete and...

ACE – Automated, Collection, and Enrichment Platform

  The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in...

Recon-ng – Full-Featured Web Reconnaissance Framework

  Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction,...

[Bug] macOS High Sierra App Store Preferences Can Be Unlocked Without a Password

Yet another password vulnerability has been uncovered in macOS High Sierra, which unlocks App Store System Preferences with any password...

Warning: New Undetectable DNS Hijacking Malware Targeting Apple macOS Users

A security researcher has revealed details of a new piece of undetectable malware targeting Apple’s Mac computers—reportedly first...

CSE Malware ZLab – Double Process Hollowing -The stealth process injection of the new Ursnif malware

A new variant of the infamous Ursnif malware spread in the wild and adopts a new advanced evasion technique dubbed Double Process...

truffleHog – Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History

Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets...

Attackers Exploit Oracle WebLogic Flaw to Mine $266K in Monero

Another day, another Monero cryptomining campaign and this time attackers exploited a security flaw in Oracle Fusion Middleware. Latest...

Intel: Νέα ευπάθεια. Προστατεύστε τους φορητούς υπολογιστές σας

Σαν να μην έφταναν στην Intel τα σφάλματα Meltdown και Specter, ο ερευνητής ασφάλειας...

Wireshark 2.4.4: ο καλύτερος αναλυτής πρωτοκόλλων δικτύου

Νέο Wireshark 2.4.4! Το Wireshark είναι ένα freeware εργαλείο για την παρακολούθηση δικτύων....

Microsploit (Office Exploitation Tool)

a Simple tool and not very special but this tool fast and easy create backdoor office exploitation using module metasploit packet. Like...

Salamandra – Spy Microphone Detection Tool

Salamandra is a tool to detect and locate spy microphones in closed environments. It find microphones based on the strength of the signal...

Archery – Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities

  Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and...