Critical Flaw found in Mac Antivirus software ESET Antivirus

eset

Google Security Team’s researchers Jan Bee and Jason Geffner have discovered an easy-to-exploit, but a critical vulnerability in ESET’s anti-virus software (ESET endpoint Antivirus 6) which allows hackers to remotely execute an arbitrary code with root privileges on a Mac system. The researchers found this vulnerability at the beginning of November 2016 and are tracked … Read more Critical Flaw found in Mac Antivirus software ESET Antivirus

Indian Hacker Helps Uber Fix ‘Unlimited Free Ride’ Bug

uber

Uber Technologies Inc. Uber is an online transportation network company headquartered in San Francisco, California, with operations in 528 cities worldwide. So, what happens if someone finds a way to ride for free in Uber, it will make a loss. Recently, an Indian Security researcher named Anand Prakash discovered a bug in August last received … Read more Indian Hacker Helps Uber Fix ‘Unlimited Free Ride’ Bug

Pupy – Open Source Cross Platform Python Remote Access Tool

Puppy Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) and post-exploitation tool mainly written in python. It features a all-in-memory execution guideline and leaves very low footprint. Pupy can communicate using various transports, migrate into processes (reflective injection), load remote python code, python packages and python C-extensions from … Read more Pupy – Open Source Cross Platform Python Remote Access Tool

Unicorn – PowerShell Downgrade Attack Evade Anti-Virus

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. https://www.trustedsec.com Welcome back today we will talk about Powershell downgrade attacks using uniscan and inject shellcode … Read more Unicorn – PowerShell Downgrade Attack Evade Anti-Virus

Useful Msfvenom and Metasploit Commands

Useful Msfvenom and Metasploit Commands The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Metasploit Framework, is a tool for developing and executing exploit code against a remote target machine. The Metasploit Project is well known for its anti-forensic and evasion … Read more Useful Msfvenom and Metasploit Commands

Encrypting USB, Mass Storage Devices With LUKS

usb stick

In this guide you will learn how to Encrypt a USB or Mass Storage Devices with LUKS encryption. What is LUKS ? Known as Linux Unified Key Setup or LUKS it is a disk encryption specification LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability among different … Read more Encrypting USB, Mass Storage Devices With LUKS

Onionmx – Onion Mail Delivery: So Delicious!

onion-mx

Onionmx -Onion Mail Delivery: So Delicious! Download Onionmx Credits: ehloonion Onion mail delivery: so delicious! Why deliver mail over Tor? Even if you use TLS for your connections they are opportunistic. Even if you use OpenPGP for your connections, it is relatively easy for someone passively monitoring email traffic to correlate interesting metadata: who is … Read more Onionmx – Onion Mail Delivery: So Delicious!

Kali Linux Man in the Middle Attack Arpspoofing/Arppoisoning

man-in-the-middle

Welcome back today we will talk about Man-in-the-middle attacks. In computer security, a man-in-the-middle attack (often abbreviated mitm, or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. In this guide we will be … Read more Kali Linux Man in the Middle Attack Arpspoofing/Arppoisoning

Estimate Proximity Between Bluetooth Devices

Welcome back in this tutorial I will show you how to estimate the proximity between Bluetooth Devices. Blueranger is a simple bash script designed by JP Dunning to estimate a distance between bluetooth devices by sending L2P Bluetooth pings. Most often Bluetooth devices allow a ping without any authentication. Blueranger only estimates the distance between … Read more Estimate Proximity Between Bluetooth Devices

Best Kali Linux Compatible Wireless Adapters

aircrack-image

Welcome back today I will show you what the best compatible adapters for Kali Linux are. If you new to Kali Linux & Pen testing it can be quite tricky to decide on the correct wireless adapter to use don’t worry we will cover the most compatible adapters for Linux below. All the adapters listed below … Read more Best Kali Linux Compatible Wireless Adapters

Whatsapp Phishing Over QR

whats-app

Whatsapp phishing Credits: Malwalu Download Whatsapp Phishing QR Tools. Authors Notes. This repo contains proof of principle code for running a phishing attack against the official Whatsapp Web client. Whatsapp what? http://www.whatsapp.com/faq/web/28080003 Short: A web client for Whatsapp. You log in by scanning a QR code on there page using Whatsapp What does it do … Read more Whatsapp Phishing Over QR

Slowloris Layer 7 DDOS Attack

slowloris

Slow Loris is Layer 7 Application (Protocol Attack) it was developed by Robert “RSnake” Hansen don’t be fooled by its power even a single computer could have the ability to take down a full web server single handedly Slowloris is a simple and powerful /DDOS attack it is also known as a low-and-slow Slowloirs is … Read more Slowloris Layer 7 DDOS Attack

Dr0p1t-Framework – Dropper that bypass most AVs

Dr0p1t-Framework

Dr0p1t-Framework Dr0p1t-Framework A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks 😉 Credits: D4Vinci – https://github.com/D4Vinci/ Installation & run server On Linux and Windows it’s the same after installing Dr0p1t by doing the steps mentioned above, install modules in server_requirements.txt by using pip like : python -m pip … Read more Dr0p1t-Framework – Dropper that bypass most AVs

Autovpn – Easily connect to a VPN in a country of your choice

auto-vpn

  autovpn Credits: adtac Download autovpn (Leave tool author a star) autovpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from VPN Gate. Compiling First clone the repo and cd into the directory: $ git clone … Read more Autovpn – Easily connect to a VPN in a country of your choice

Autopsy – Digital Forensics Platform

Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera’s memory card. Installers can be found at: http://www.sf.net…http://www.sleuthkit.org/autopsy/ … Read more Autopsy – Digital Forensics Platform

Facebrok – Social Engineering Tool Oriented to facebook

facebrok

ABOUT Download Facebrok Credits: PowerScript facebrok is a social tool for exploiting social network accounts facebook, this platform brings together various Templates explotacion credentials for specific objectives. SF: http://sourceforge.net/projects/facebrok/ http://cave-rt.blogspot.co.uk/2015/06/como-instalar-y-usar-facebrok-project.html REQUIREMENTS PHP MYSQL INSTALLATION Extract the facebrok[Vs{LastVersion}].rar Upload files to server Install. Features tIME lINE |————————————————————->End-Time |-> News Vs 1.9 – 2016-10-12 |-> * New … Read more Facebrok – Social Engineering Tool Oriented to facebook

wifijammer

wifi-jamming

wifijammer Continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. Requires: python 2.7, python-scapy, a wireless card … Read more wifijammer

fb-messenger-cli

terminal

fb-messenger-cli Facebook Messenger Command line client Use your Facebook account to chat with your friends sneakily in the command line, it’s as easy as logging in, choosing a convo and chatting away. Install npm install -g fb-messenger-cli Then fb-messenger-cli from anywhere Choose a friend Chat away Helpful options Features: Real time refreshing on new messages … Read more fb-messenger-cli

PytheM – Multi-purpose pentest framework

pythembkg

PytheM – Penetration Testing Framework v0.6.6 Credits: m4n3dw0lf Download PytheM PytheM is a python multi-purpose pentest framework. It has been developed in the hope that it will be useful and I don’t take responsibility for any misapplication of it. Only runs on GNU/Linux OS. Examples ARP spoofing – Man-in-the-middle pythem> set interface [+] Enter the … Read more PytheM – Multi-purpose pentest framework

Subscribe to our mailing list.

yoast seo premium free