Malware analysis Gozi ISFB – Bank Trojan aka Ursnif
Introduction: Discussing the Evolving Threat of Ursnif (GOZI/ ISFB) Malware in Cybersecurity In the dynamic landscape of cybersecurity, professionals are
Read MoreIntroduction: Discussing the Evolving Threat of Ursnif (GOZI/ ISFB) Malware in Cybersecurity In the dynamic landscape of cybersecurity, professionals are
Read MoreSome work from Prodefence Team. 01-08.2018
Read MoreIt seems that scam is not always successful. 683 views… 15 Likes… Fake comments… “woooow”… Truth is the same. Those
Read MoreI’m starting to stop trusting hackers … How to start sharing it… if is not done yet ….. or are
Read MoreHello. Today we will be investigating a phishing case. Usually the attack of this type comes by email. An email
Read MoreHello. I found something interesting for today. The form i found the file is the classic one: Hacking forum-> Magic
Read MoreHello. Today I had a nice surprise. I found in the Spam file an email telling me they just sent
Read MoreHello again. Most computer users do not have a specific IT security training. They use simple passwords, save them in
Read MorePhishruffus is a tool designed to identify threats and malicious DNS servers on the Internet that are used for the
Read MoreWith 96% of HR managers now using IT certifications as screening or hiring criteria during recruitment, getting certified is an
Read MoreWith this script you can spam WiFi APs. How to run it? Download “APs_Beacon.sh” and “SSID_List.txt” or type “git clone
Read MoreBlackOrphan is a tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box BlackOrphan is
Read Morelinux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. It focuses on software packages
Read MoreGetting ready to take the CCNA/CCENT/CCDA/CCNA Security certification exam? We asked InfoSec Institute professors and industry experts to send us
Read MoreCheck current PHP configuration for potential security flaws. Simply access this file from your webserver or run on CLI. Author
Read MoreKRACK Detector is a Python script to detect possible KRACK attacks against client devices on your network. The script
Read MoreStriker is an offensive information and vulnerability scanner. Features Just supply a domain name to Striker and it will automatically
Read MoreMany of us are trying to make money online from home. One solution would be the websites that offer some
Read MoreTROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to:
Read Morehashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over
Read MoreWe are excited to announce this major release of auditing tool Lynis. Several big changes have been made to
Read MoreExitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run
Read MoreNikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items,
Read MoreA Simple tool for installing pentest tools and forensic tools on Debian / Ubuntu Based OS Tested on Linux
Read MoreMassive SQL injection vulnerability scanner. Features multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning
Read MoreThere are some features that we think SQLMap should have. Like finding admin panel of the target, better hash cracking
Read More[amazon_link asins=’0128016353,1597495867,1285060032,1785887106,1517713609′ template=’ProductCarousel’ store=’secure001a-20′ marketplace=’US’ link_id=’2f9f1c3b-bd4c-11e7-b344-27bce27720b0′] Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and
Read MoreI found some ”free” software on the internet backdoored with that Silent Minergate, so this time i downloaded the
Read MoreCryptography falls into the sixth and last domain of CompTIA’s Security+ exam (SYO-401) and contributes 12% to the exam score.
Read MoreIntroduction The “access control and identity management” domain is aimed at teaching and testing on industry-accepted practices, such as determining
Read More