Quantum Computing and Information Security

quantum computing

Let us first focus on understanding what Quantum Computing refers to and why it is required. Let us have a brief look at working of a Classical Computer and Quantum Computer. The Working A classical computer is made up of very simple components doing simple operations, like representing data, means of processing data and the … Read more Quantum Computing and Information Security

Tizi: New Android Spyware Discovered by Google

Google play protect is well known for its new AI-powered malware detection mechanism, Google Play Protect Service recently detected an Android spyware dubbed as “Tizi.” Targeting devices in African countries, Tizi comes with fully featured android rooting and data collection capabilities. It creates a backdoor in the affected device and sends sensitive information related to … Read more Tizi: New Android Spyware Discovered by Google

Findsploit – Find exploits in local and online databases instantly

findsploit

Find exploits in local and online databases instantly Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically compile and run any C exploit (ie. ./copysploit 1337.c && ./compilesploit 1337.c). … Read more Findsploit – Find exploits in local and online databases instantly

Hack Captive Portal – Hack any Captive portal using MAC-spoofing technique

captive-portal

Hack Captive portals script Hack any Captive portal using MAC-spoofing technique This script is using MAC-spoofing technique. This method is the only one which is present in all wireless and some wired Captive portals by design. Once a host is authorized by the Captive portal, its MAC and IP address are allowed unrestricted access. All … Read more Hack Captive Portal – Hack any Captive portal using MAC-spoofing technique

How to increase volume above 100% in Linux

volume

How to increase volume above 100% in Linux Welcome back today I will show you how to increase volume settings above 100% in Linux. Warning only exceed volumes your speakers can handle. In a Linux based operating system open a new command terminal & enter command. apt-get install pulseaudio Next we need to install pavucontrol … Read more How to increase volume above 100% in Linux

Uber Paid Hackers $100,000. Read Why

Uber’s CEO Mr. Dara Khosrowshahi, on 21 Nov published a blog post regarding a hack which happened in the month of October 2016. The hackers stole personal data of 57 million customers and drivers from a third-party cloud service which was used by Uber. The hackers were two individual outsiders. According to an article published … Read more Uber Paid Hackers $100,000. Read Why

Google Caught Collecting Android Location Data Even When GPS is Disabled

There are over 2 billion people using Androids nowadays, this figure is given by Google itself, in the month of May 2017 Google announced that there are over 2 billion active smartphone users. But what Google didn’t announce is that these 2 billion smartphones data is been collected by Google for there location-based marketing purpose. … Read more Google Caught Collecting Android Location Data Even When GPS is Disabled

WATCH: Slaughterbots – Autonomous Weapons

Slaughterbots is a short video by Stop Autonomous Wepons that shows the threats of weponizing AI and drone technology. This video shows threats from technology we already have. These drones have precision mapping technology that allows them to map a room in real time and teach themselves to perform aerial maneuvers that human controllers cannot possibly perform.

WATCH: Slaughterbots – Autonomous Weapons

If this isn’t what you want, please take action at http://autonomousweapons.org/

Habu – Python Network Hacking Toolkit

computer-network

Habu: Network Hacking Toolkit I’m developing Habu to teach (and learn) some concepts about Python and Network Hacking. These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of them are related with networking, and the implementations are intended to be understandable for who wants to read the source … Read more Habu – Python Network Hacking Toolkit

BlackOrphan – Tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box

remote-access-tool-rat

BlackOrphan is a tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box BlackOrphan is a tool built with Bash/nodejs mainly for gaining a remote shell access to a linux BoX USAGE clone this repo git clone https://github.com/zombieleet/BlackOrphan.git run blackorphan from the command line ./BlackOrphan1.0 ============================== 1. Create a server … Read more BlackOrphan – Tool built with Bash/nodeJs mainly for gaining a remote shell access to a Linux Box

APs_Beacon – With this script you can spam WiFi APs/Hotspots

aps_becon

With this script you can spam WiFi APs. How to run it? Download “APs_Beacon.sh” and “SSID_List.txt” or type “git clone https://github.com/BlueArduino20/APs_Beacon“ You need to give execution permissions by typing: “chmod +x APs_Beacon.sh” You open the script: “./APs_Beacon.sh” That’s all. [php]git clone https://github.com/BlueArduino20/APs_Beacon cd APs_Beacon chmod +x APs_Beacon.sh ./APs_Beacon.sh[/php] CREDITS: BlueArduino20 DOWNLOAD APs_Beacon We recommend usage … Read more APs_Beacon – With this script you can spam WiFi APs/Hotspots

MorphAES – IDPS & SandBox & AntiVirus STEALTH KILLER

morphaes

DPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world’s first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it’s cross-platform as well and library-independent. Properties: Polymorphism (AES encryption) Metamorphism (logic and constants changing) Platform independent (Linux/BSD/Windows) IDPS stealthing (the total number of possible … Read more MorphAES – IDPS & SandBox & AntiVirus STEALTH KILLER

Hijacker – Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

hijacker-airodump

    Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3, and Reaver. It offers a simple and easy UI to use these tools without typing commands in a console and copy&pasting MAC addresses. This application requires an ARM android device with a wireless adapter that supports Monitor Mode. A … Read more Hijacker – Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

LAF – Linux Application Firewall (LAF) application firewall for Linux

fire-wall

Requirements LAF requires libnetfilter-queue, it’s dependency libnfnetlink and a kernel 2.6.14 or later. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Install [php] Install the required dependencies. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Compile with make: make Run [clang](http://clang-analyzer.llvm.org/scan-build.html) static analyser: scan-build make Create an iptables rule: sudo iptables -A OUTPUT -p all -j NFQUEUE –queue-num 0 Add entries … Read more LAF – Linux Application Firewall (LAF) application firewall for Linux

Infernal Twin – Wireless hacking – This is automated wireless hacking tool

internet

##Infernal-Wireless v2.6Release 2.6.11 ##Features added and improved: Menu to retrieve logs are added ##Infernal-Wireless v2.6 Release 2.6.10 ##Features added and improved: Added BeeF XSS framework Integration Added HTTP Traffic View within tool Improved Infenral Wireless Attack Visual View of some of the panel improved Improved Basic Authentication during Social engineering assessment over wireless network Infernal-Wireless … Read more Infernal Twin – Wireless hacking – This is automated wireless hacking tool

TrackerJacker – Tracks WiFi devices by capturing raw 802.11 frames in monitor mode

wifi

Finds and tracks wifi devices through raw 802.11 monitoring. PyPI page: https://pypi.python.org/pypi/trackerjacker Install pip3 install trackerjacker Usage Find detailed usage like this: trackerjacker -h There are 2 major usage modes for trackerjacker: map mode and track mode: Map mode example Map mode is used to find the Access Points and Devices within the range. Think … Read more TrackerJacker – Tracks WiFi devices by capturing raw 802.11 frames in monitor mode

CloakifyFactory – Data Exfiltration & Infiltration In Plain Sight

CloakifyFactory & the Cloakify Toolset – Data Exfiltration & Infiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Defeat Data Whitelisting Controls; Evade AV Detection. Text-based steganography usings lists. Convert any file type (e.g. executables, Office, Zip, images) into a list of everyday strings. Very simple tools, powerful concept, limited only by your … Read more CloakifyFactory – Data Exfiltration & Infiltration In Plain Sight

Git All the Payloads! A collection of web attack payloads

payloads

payloads Git All the Payloads! A collection of web attack payloads. Pull requests are welcome! Credits: foospidy Usage run ./get.sh to download external payloads and unzip any payload files that are compressed. Payload Credits fuzzdb – https://github.com/fuzzdb-project/fuzzdb SecLists – https://github.com/danielmiessler/SecLists xsuperbug – https://github.com/xsuperbug/payloads NickSanzotta – https://github.com/NickSanzotta 7ioSecurity – https://github.com/7ioSecurity/XSS-Payloads shadsidd – https://github.com/shadsidd shikari1337 – https://www.shikari1337.com/list-of-xss-payloads-for-cross-site-scripting/ … Read more Git All the Payloads! A collection of web attack payloads

PowerStager – Script creates an executable stager that downloads selected powershell payload

powerstager

PowerStager: This script creates an executable stager that downloads a selected powershell payload. Contact Author: z0noxz Source: https://github.com/z0noxz/powerstager Email: z0noxz@mail.com Description This script creates an executable stager that downloads a selected powershell payload, loads it into memory and executes it using obfuscated EC methods. The script will also encrypt the stager for dynamic signatures and … Read more PowerStager – Script creates an executable stager that downloads selected powershell payload

Trity – advanced pentesting framework vulnerability testing to cryptography

trity-advanced-pentesting-framework

Trity Trity is an advanced pentesting framework dedicated to everything from vulnerability testing to cryptography. Installation & Usage In order to install this program, it is crucial that you are on a Linux-based distro, preferably Kali-Linux or BackBox. First, git clone. git clone https://github.com/toxic-ig/Trity.git Change directory, and then run the installer script (Must be root … Read more Trity – advanced pentesting framework vulnerability testing to cryptography

Subscribe to our newsletter!

yoast seo premium free