Telegram Hacked - Possible Nation State Attack By Iran

Telegram Hack – Possible Nation State Attack By Iran

So there’s been a lot of news lately about the Telegram hack and how 15 million accounts were compromised, which is not technically true. There’s 2 vectors of attack at play here, both of which regard Iranian users, but are not connected (other than the attackers probably being the same group). So the two attacks […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Privacy | Add a Comment
miranda-upnp - Interactive UPnP Client

miranda-upnp – Interactive UPnP Client

Miranda is a Python-based UPnP (Universal Plug-N-Play) client application designed to discover, query and interact with UPNP devices, particularly Internet Gateway Devices (aka, routers). It can be used to audit UPNP-enabled devices on a network for possible vulnerabilities. Miranda was built on and for a Linux system and has been tested on a Linux 2.6 […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
fping 3 - Multi Target ICMP Ping Tool

fping 3 – Multi Target ICMP Ping Tool

fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. fping differs from ping in that you can specify any number of targets on the command line, or specify a file containing the lists of targets to ping. Instead of sending […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
In 2016 Your Wireless Keyboard Security Still SUCKS - KeySniffer

In 2016 Your Wireless Keyboard Security Still SUCKS – KeySniffer

So you’d probably imagine that Wireless Keyboard Security is a 1998 problem and you shouldn’t even have to worry about that any more. And you’d be wrong – two-thirds of wireless keyboards, from MAJOR manufacturers are not even vaguely secure. It turns out, in 2016 when cryptography is mainstream, open-source and fairly easy to implement […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment
WOL-E - Wake On LAN Security Testing Suite

WOL-E – Wake On LAN Security Testing Suite

WOL-E is a suite of tools for Wake on LAN security testing related to the WOL features of network attached computers, this is now enabled by default on many Apple computers. This allows you to easily scan for Apple devices on a network (based on their MAC addresses). Features These tools include: Bruteforcing the MAC […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
dnmap - Distributed Nmap Framework

dnmap – Distributed Nmap Framework

dnmap is a distributed Nmap framework which can hand off Nmap scans to several clients. It reads an already created file with Nmap commands and send those commands to each client connected to it. The framework use a client/server architecture. The server knows what to do and the clients do it. All the logic and […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Everything You Need To Know About Web Shells

Everything You Need To Know About Web Shells

So let’s talk about Web Shells, something many of us are already familiar with, but to level the field – what is a web shell? A web shell is a script that can be uploaded to a web server to enable remote administration of the machine. Infected web servers can be either Internet-facing or internal […]

Tags: , , , , , , , , , , ,

Posted in: Advertorial, Web Hacking | Add a Comment
DMitry - Deepmagic Information Gathering Tool

DMitry – Deepmagic Information Gathering Tool

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host. DMitry has a base functionality with the ability to add new functions, the basic functionality of DMitry allows for information to be gathered about a target […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment
Automater - IP & URL OSINT Analysis

Automater – IP & URL OSINT Tool For Analysis

Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal. By […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Android Malware Giving Phones a Hummer

Android Malware Giving Phones a Hummer

So Android Malware has always been quite a problem, especially with it being so easy to install random .apk files and the proliferation of 3rd party app stores. Also so many people with rooted phones and the fact that software installed can root your phone and take complete control. The current worry is the Hummer […]

Tags: , , , , , , , , ,

Posted in: Malware | Add a Comment