TheFatRat - Massive Exploitation Tool

TheFatRat – Massive Exploitation Tool

TheFatRat is an easy-to-use Exploitation Tool that can help you to generate backdoors and post exploitation attacks like browser attack DLL files. This tool compiles malware with popular payloads and then the compiled malware can be executed on Windows, Linux, Mac OS X and Android. The malware that is created with this tool also has […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment
South Korean Webhost Nayana Pays USD1 Million Ransom

South Korean Webhost Nayana Pays USD1 Million Ransom

So far this Nayana payout is the biggest ransomware payment I’ve seen reported, there’s probably some bigger ones been paid but kept undercover. Certainly a good deal for the bad actors in this play, and well using an outdated Kernel along with PHP and Apache versions from 2006 you can’t feel too sorry for Nayana. […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware | Add a Comment
pyrasite - Inject Code Into Running Python Processes

pyrasite – Inject Code Into Running Python Processes

pyrasite is a Python-based toolkit to inject code into running Python processes. pyrasite works with Python 2.4 and newer. Injection works between versions as well, so you can run Pyrasite under Python 3 and inject into 2, and vice versa. Usage

You can download pyrasite here: pyrasite-2.0.zip Or read more here.

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Programming | Add a Comment
snitch - Information Gathering Tool Via Dorks

snitch – Information Gathering Tool Via Dorks

Snitch is an information gathering tool which automates the process for a specified domain. Using built-in dork categories, this tool helps gather specified information domains which can be found using web search engines. It can be quite useful in early phases of penetration tests (commonly called the Information Gathering phase). snitch can identify general information, […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Privacy, Web Hacking | Add a Comment
Fake News As A Service (FNaaS?) - $400k To Rig An Election

Fake News As A Service (FNaaS?) – $400k To Rig An Election

This is pretty interesting, the prices for Fake News as a Service have come out after some research by Trend Micro, imagine that you can create a fake celebrity with 300,000 followers for only $2,600. Now we all know this Fake News thing has been going on for a while, and of course, if it’s […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Social Engineering | Add a Comment
credmap - The Credential Mapper

credmap – The Credential Mapper

Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these. It is not uncommon for people who are not experts in […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Password Cracking, Privacy | Add a Comment
LazyDroid - Android Security Assessment Tool

LazyDroid – Android Security Assessment Tool

Lazydroid is a tool written as a bash script to facilitate some aspects of an Android Security Assessment. Features It provides some common tasks such as: Set the debug flag of an application to true Set the backup flag of an application to true Re-Build the application Re-Sign the application Smart log extraction of an […]

Tags: , , , , , , ,

Posted in: Hacking Tools | Add a Comment
OneLogin Hack - Encrypted Data Compromised

OneLogin Hack – Encrypted Data Compromised

The OneLogin hack is blowing up now it seems like whoever got access can also decrypt encrypted customer data which is just about AS BAD as it can get for a password/identity management service. Now I’m a HUGE supporter of password management tools as I’ve mentioned many times here, so anyone who signed up for […]

Tags: , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Privacy, Web Hacking | Add a Comment
EtherApe - Graphical Network Monitor

EtherApe – Graphical Network Monitor

EtherApe is a graphical network monitor for Unix modelled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Colour coded protocols display. It supports Ethernet, FDDI, Token Ring, ISDN, PPP, SLIP and WLAN devices, plus several encapsulation formats. It can filter traffic […]

Tags: , , , , , , ,

Posted in: Countermeasures, Network Hacking, Security Software | Add a Comment
maltrail - Malicious Traffic Detection System

maltrail – Malicious Traffic Detection System

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for […]

Tags: , , , , , , ,

Posted in: Countermeasures, Malware, Security Software | Add a Comment