Archive | Privacy




spectrology – Basic Audio Steganography Tool

spectrology is a Python-based audio steganography tool that can convert images to audio files with a corresponding spectrogram encoding, this allows you to hide hidden messages via images inside audio files. Using this tool you can select range of frequencies to be used and all popular image codecs are supported. Usage

Example

You […]

Tags: , , , , , ,

Posted in: Cryptography, Hacking Tools, Privacy | Add a Comment

European Commission Pushing For Encryption Backdoors

The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ backdoor keys. This is now getting more serious in Europe with the EC actually forcing the issue (in a passive aggressive kind of way for […]

Tags: , , , , , ,

Posted in: Cryptography, Legal Issues, Privacy | Add a Comment

WikiLeaks Exposes Massive CIA Leak Including Hacking Tools

WikiLeaks has dropped another massive bomb called “Vault7“, basically a massive CIA leak which covers documents, correspondence, hacking tools, exploits and much more. It details sophisticated software tools and techniques used by the agency to break into smartphones, computers and even Smart TVs. The first installment published already contains 7,818 web pages with 943 attachments […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Legal Issues, Privacy | Add a Comment

ONIOFF – Onion URL Inspector

ONIOFF is basically an Onion URL inspector, it’s a simple tool – written in pure python – for inspecting Deep Web URLs (or onions). It takes specified onion links and returns their current status along with the site’s title. It’s compatible with Python 2.6 & 2.7. Usage

To view all available options run:

[…]

Tags: , , , , , , , , , , , ,

Posted in: Cryptography, Privacy | Add a Comment

Dark Web Paying Corporate Workers To Leak Info

This is not particularly new news, but the Dark Web paying corporate workers to leak info – especially pertaining to stock prices (earnings reports etc) is setting the mainstream news on fire at the moment. It’s also funny because people constantly contact us asking questions about the ‘Dark Web’ aka the ‘Dark Net’ which happens […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

China To Outlaw All Unapproved VPN Services

So the latest news from behind the Great Firewall of China is that they plan to crack down on all unapproved VPN services. This means all VPN providers, cloud service providers and ISPs will have to seek an annually renewed licence to operate a VPN Service. Really, not very surprising coming out of China and […]

Tags: , , , , , , ,

Posted in: Cryptography, Privacy | Add a Comment

MongoDB Ransack – Over 33,000 Databases Hacked

Ah our favourite database in the news again, being hailed as the MongoDB Ransack a whole bunch of people have turned the insecure MongoDB default configuration into a ransom opportunity. They are deleting/stealing databases and soliciting bitcoin payments to return the data. With multiple actors doing the same stuff though it’s hard to know who […]

Tags: , , , , , , , , ,

Posted in: Database Hacking, Privacy | Add a Comment

Exitmap – Tor Exit Relay Scanner

Exitmap is a fast and modular Python-based Tor exit relay scanner. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional programming, think of exitmap as a map() interface for Tor exit relays. Modules can perform any TCP-based networking task; fetching a web page, […]

Tags: , , , , , , ,

Posted in: Network Hacking, Privacy | Add a Comment

UK Encryption Backdoor Law Passed Via Investigatory Powers Act

The latest news out of my homeland is not good, the UK encryption backdoor law passed via Investigatory Powers Act or the IPA Bill as it’s commonly known. And itself was passed through a kind of backdoor route, which avoided the scorn of the public. Which was good for the lawmakers, but not for the […]

Tags: , , , , , , ,

Posted in: Cryptography, Legal Issues, Privacy | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·