PrivCount – Privacy-preserving Tor statistics aggregation tool

tor

PrivCount makes Tor statistics collection more secure. PrivCount produces totals across all participating relays. Noise is added to each total to hide typical user activity. PrivCount protects individual relay totals by adding a blinding factor, which is only removed when the statistics are aggregated. Should I Run PrivCount? Don’t run PrivCount unless you enjoy running … Read more

Free Cyber Security & Hacking eBooks

libary

A curated list of free Security and Pentesting related E-Books available on the Internet. If you want to contribute to this list (please do), send a pull request. All contributors will be recognized and appreciated. The topics include: Android & iOS Cloud Security Defensive Security IoT Malware Analysis & Forensics Network Pentesting Offensive Security Programming … Read more

plc – ns-3 module for simulations of power line communication networks

power-lines

An ns-3 module for simulations of power line communication networks plc An ns-3 module for simulations of power line communication networks This software is freely useable provided that publications resulting from the use of this software cite the publications listed here. Cite: F. Aalamifar, A. Schloegl, D. Harris, L. Lampe,“Modelling Power Line Communication Using Network … Read more

KICKthemOUT3 – KICK devices off your NETW0RK

Kick devices off network

KICKthemOUT3 – KICK devices off your NETW0RK Kick devices off your network K1CK devices off your N3TW0RK by performing an ARP Spoof attack with Python3+ Compatability A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them … Read more

Create Customized .onion Addresses For Tor Hidden Services

tor

Create Customized .onion Addresses For Tor Hidden Services Tor’s .onion links can often look quite random in this article I will show you how to create customized .onion address for use with Tor’s hidden services. Customized .onion links can often help other Tor users find and recognize your site easier. For example take Facebook’s .onion … Read more

How to use Hacking Tools Without Opening Ports on Router NAT Firewall

How to use Hacking Tools Without Opening Ports on Router NAT Firewall

Hello, welcome back in a recent tutorial (How to Use Metasploit, SEToolkit Without Opening Ports Kali Linux) we worked with Ngrok creating secure introspectable tunnels. Using tunnels while pentesting can be a lot safer using these encrypted tunnels we can expose a local server behind a NAT or firewall to the Internet essentially bypassing restrictions … Read more

Hacking Linux Operating System for Remote Access: Malicious Debian Package

Welcome back today we will be talking about Remote Access of machines running on Linux Operating Systems. Why would someone want to Target a system running on Linux? Over 60% of all web servers around the world are running variations of Linux and a lot of personal Computers & Smart Phones. Let us just say … Read more