UACMe - Defeat Windows User Account Control (UAC)

UACMe – Defeat Windows User Account Control (UAC)

UACme is a compiled, C-based tool which contains a number of methods to defeat Windows User Account Control commonly known as UAC. It abuses the built-in Windows AutoElevate backdoor and contains 41 methods. The tool requires an Admin account with the Windows UAC set to default settings. Usage Run executable from command line: akagi32 [Key] […]

Topic: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking
What You Need To Know About SSRF - Server Side Request Forgery

What You Need To Know About Server Side Request Forgery (SSRF)

SSRF or Server Side Request Forgery is an attack vector that has been around for a long time, but do you actually know what it is? Server Side Request Forgery (SSRF) refers to an attack where in an attacker is able to send a crafted request from a vulnerable web application. SSRF is usually used […]

Topic: Exploits/Vulnerabilities
SAML Raider - SAML2 Security Testing Burp Extension

SAML Raider – SAML2 Security Testing Burp Extension

SAML Raider is a Burp Suite extension for SAML2 security testing, it contains two core functionalities – Manipulating SAML Messages and managing X.509 certificates. The extension is divided into two parts, a SAML message editor and a certificate management tool. Features Message Editor Features of the SAML Raider message editor: Sign SAML Messages Sign SAML […]

Topic: Hacking Tools, Networking Hacking
faker.js - Tool To Generate Fake Data

faker.js – Tool To Generate Fake Data For Testing

faker.js is a tool to generate fake data in Node.js and in the browser, it has a lot of different data types to enable you to generate very customised and complete sets of fake or mock data for testing purposes. It also supports multiple languages and locales and can generate a lot of data types […]

Topic: Hacking Tools, Secure Coding
Should US Border Cops Need a Warrant To Search Devices?

Should US Border Cops Need a Warrant To Search Devices?

The answer from me is, OF COURSE, f&ck yes. They can’t search your home, car and anywhere else in the country, they would need a warrant to search devices too. A case by the EFF (Electronic Frontier Foundation) is heading to the Fifth Circuit Court of Appeals in the US to find out what should […]

Topic: Legal Issues, Privacy
jSQL - Automatic SQL Injection Tool In Java

jSQL – Automatic SQL Injection Tool In Java

jSQL is an automatic SQL Injection tool written in Java, it’s lightweight and supports 23 kinds of database. It is free, open source and cross-platform (Windows, Linux, Mac OS X) and is easily available in Kali, Pentest Box, Parrot Security OS, ArchStrike or BlackArch Linux. Features of jSQL Java SQL Injection Tool Automatic injection of […]

Topic: Database Hacking