LiME - Linux Memory Extractor

LiME – Linux Memory Extractor

LiMe is a Loadable Kernel Module (LKM) Linux memory extractor which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME unique as it is the first tool that allows for full memory captures on Android devices. It also minimizes its interaction between user and kernel space processes during […]

Tags: , , , , , , ,

Posted in: Forensics, Hacking Tools | Add a Comment
HookME - API Based TCP Proxy Including SSL

HookME – API Based TCP Proxy Including SSL

HookME is an API based TCP Proxy software designed for intercepting communications by hooking the desired process and hooking the API calls for sending and receiving network data (even SSL clear data). HookME provides a nice graphic user interface allowing you to change the packet content in real time, dropping or forwarding the packet. It […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
WinRAR Vulnerability Drama Is Unfounded

WinRAR Vulnerability Is Complete Bullshit

So Twitter exploded earlier with calls of a remote code execution WinRAR vulnerability leaving half a BILLION users open for some hardcore exploitation. I got interested (obviously..as that’s what I do here) and went to read about it, I have to call pretty sketchy, non-technical reporting from the The Register for once, it seems like […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment
FSFlow - A Social Engineering Call Flow Application

FSFlow – A Social Engineering Call Flow Application

FSFlow is a Social Engineering Call Flow Application, which was created to improve and standardize social engineering calls. It’s a difficult thing to do, conversations can go almost anywhere over the span of a phone call which makes defining a specific process hard, if not impossible. FSFlow is mostly a proof of concept tool but […]

Tags: , , , , , ,

Posted in: Social Engineering | Add a Comment
EvilFOCA - Network Attack Toolkit

EvilFOCA – Network Attack Toolkit

Evil Foca is a network attack toolkit for penetration testing professionals and security auditors whose purpose it is to test security in IPv4 and IPv6 data networks. The software automatically scans the networks and identifies all devices and their respective network interfaces, specifying their IPv4 and IPv6 addresses as well as the physical addresses through […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
XcodeGhost iOS Infection Over 4000 Apps

XcodeGhost iOS Trojan Infected Over 4000 Apps

So the recent XcodeGhost iOS Trojan Infection has escalated quickly, an initial estimate of 39 infected apps has rapidly increased to over 4000! You can see the FireEye announcement here: Protecting Our Customers from XcodeGhost XCodeGhost is the first instance of the iOS App Store distributing a large number of trojanized apps, the malicious/infected apps […]

Tags: , , , , , , ,

Posted in: Apple, Exploits/Vulnerabilities, Malware | Add a Comment
peinjector - MITM PE File Injector

peinjector – MITM PE File Injector

The peinjector is a MITM PE file injector, the tool provides different ways to infect Windows platform executable files (PE COFF) with custom payloads without changing the original functionality. It creates patches, which are then applied seamlessly during file transfer. It is very performant, lightweight, modular and can be operated on embedded hardware. Features Full […]

Tags: , , , , , ,

Posted in: Hacking Tools, Programming, Windows Hacking | Add a Comment
Weevely 3 - Weaponized PHP Web Shell

Weevely 3 – Weaponized PHP Web Shell

Weevely is a command line weaponized PHP web shell dynamically extended over the network at runtime and is designed for remote administration and pen testing. It provides a telnet-like console through a PHP script running on the target, even in restricted environments. The low footprint agent and over 30 modules shape an extensible framework to […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Kid Gets Arrested For Building A Clock - World Goes NUTS

Kid Gets Arrested For Building A Clock – World Goes NUTS

So, today we have a tale of the fabled American knee-jerk reaction, this time to a 14 year old Muslim boy who made a cool clock and brought it to school. He got arrested, cuffed and fingerprinted – over a science project. Yah, arrested for building a clock. That seems like a slightly harsh reaction, […]

Tags: , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment
BackBox Linux - Penetration Testing LiveCD

BackBox Linux – Penetration Testing LiveCD

BackBox is a Linux distribution based on Ubuntu – a penetration testing LiveCD. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Linux Hacking, Web Hacking | Add a Comment