StreamArmor – Discover & Remove Alternate Data Streams (ADS)

StreamArmor is a tool for discovering hidden alternate data streams (ADS) and can also clean them completely from the system. It’s advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. StreamArmor comes with fast multi threaded ADS scanner which can recursively […]

Topic: Forensics, Malware, Windows Hacking
Darknet 2009

The New Look Darknet & A New VPS

If you’ve been reading regularly you would have probably noticed unavailability or extreme loading times during March. Anyway, it was about time I updated the look of the site and the functionality needed implementing properly so I took the change to put up a new theme and fix any inefficient parts of the old setup. […]

Topic: Site News

Mozilla Beats Apple & Microsoft to Pwn2Own Patch For Firefox

Seems like Pwn2Own is getting a reputation for uncovering some pretty nasty browser based vulnerabilities, once again this year Firefox, Safari and IE8 were all broken wide open. The latest development is Mozilla has beaten both Microsoft and Apple to the punch and released Firefox 3.6.3 patching the vulnerability. Again it was a critical vulnerability […]

Topic: Exploits/Vulnerabilities, Web Hacking

pwnat – NAT To NAT Client Communication Tool

pwnat, pronounced “poe-nat”, is a tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other. The server does not need to know anything about the clients trying to […]

Topic: Hacking Tools, Networking Hacking

Open Source Keykeriki Captures Wireless Keyboard Traffic

Another interesting attack, rather than going after the PC/Server this one goes after the data sent by wireless devices such as the wireless keyboards sold by Microsoft. The neat thing is by using a replay attack you could also send rogue inputs to the device. But then it serves Microsoft right for using XOR encryption […]

Topic: Hardware Hacking, Privacy