Goby: Attack surface mapping
Hacker Tools
cybarrior

Goby: Attack surface mapping

[ad_1] Goby – Attack surface mapping The new generation of network security technology achieves rapid security emergency through the establishment of a complete asset database

Read More »
MUST READ
Hacker Tools
cybarrior

MUST READ

[ad_1] Recently, we moved to the new Facebook fan page. So, we have never shared or posted anything Security Training Share Facebook fan page. Please

Read More »
Web Auto Enum
Hacker Tools
cybarrior

WAES: Web Auto Enum & Scanner

[ad_1] CPH:SEC WAES at a Glance Doing HTB or other CTFs enumeration against targets with HTTP(S) can become trivial. It can get tiresome to always

Read More »
HashCobra - Hash Cracking Tool
Hacker Tools
cybarrior

HashCobra – Hash Cracking Tool

[ad_1] hashcobra Hash Cracking tool. Usage $ ./hashcobra -H–==[ hashcobra by sepehrdad ]==–usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> – hashing algorithm [default:

Read More »
Functrace - A Function Tracer
Hacker Tools
cybarrior

Functrace – A Function Tracer

[ad_1] functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based on DynamoRIO):

Read More »
Open Redirect Payload List
Hacker Tools
cybarrior

Open Redirect Payload List

[ad_1] Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to

Read More »
aSYNcrone - A SYN Flood DDoS Tool
Hacker Tools
cybarrior

aSYNcrone – A SYN Flood DDoS Tool

[ad_1] aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon. Disable the destination system by sending a SYN packet intensively to the destination.aSYNcrone’s POWER!!! USAGEgit

Read More »
RESim: dynamic system analysis tool
Hacker Tools
cybarrior

RESim: dynamic system analysis tool

[ad_1] RESim RESim is a dynamic system analysis tool that provides detailed insight into processes, programs, and data flow within networked computers. RESim simulates networks

Read More »
Corsy - CORS Misconfiguration Scanner
Hacker Tools
cybarrior

Corsy – CORS Misconfiguration Scanner

[ad_1] Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. UsageUsing Corsy is pretty simplepython corsy.py -u https://example.comA delay between

Read More »
Dread is Back Online (Again)
Darkweb
cybarrior

Dread is Back Online (Again)

[ad_1] Dread is back online after an extended period of downtime. The forum relaunched with a large set of new features including UI improvements, coatrooms,

Read More »
Sshtunnel - SSH Tunnels To Remote Server
Hacker Tools
cybarrior

Sshtunnel – SSH Tunnels To Remote Server

[ad_1] Inspired by https://github.com/jmagnusson/bgtunnel, which doesn’t work on Windows.See also: https://github.com/paramiko/paramiko/blob/master/demos/forward.py Requirements paramiko Installationsshtunnel is on PyPI, so simply run: pip install sshtunnel or easy_install

Read More »
DNCI - Dot Net Code Injector
Hacker Tools
cybarrior

DNCI – Dot Net Code Injector

[ad_1] DNCI allows the injection of .Net code (.exe or .dll) remotely in unmanaged processes in windows. 1. Project StructureThe project is structured in: DNCI.Injector.Library

Read More »
SQL Injection Payload List
Hacker Tools
cybarrior

SQL Injection Payload List

[ad_1] SQL InjectionIn this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL

Read More »
RFI/LFI Payload List
Hacker Tools
cybarrior

RFI/LFI Payload List

[ad_1] As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course it takes a

Read More »
The SamSara Market Homescreen
Darkweb
cybarrior

The Admin of SamSara Market is Gone

[ad_1] SamSara Market, the official yet unofficial successor to Dream Market, has been down for several days without any explanation from the market’s administration. The

Read More »
Rsdl - Subdomain Scan With Ping Method
Hacker Tools
cybarrior

Rsdl – Subdomain Scan With Ping Method

[ad_1] Subdomain Scan With Ping Method. Flags Value Description –hostname example.com Domain for scan. –output Records the output with the domain name. –list /tmp/lists/example.txt Lister

Read More »
HAL - The Hardware Analyzer
Hacker Tools
cybarrior

HAL – The Hardware Analyzer

[ad_1] HAL [/hel/] is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes with a fully-fledged

Read More »
Mallory - HTTP/HTTPS Proxy Over SSH
Hacker Tools
cybarrior

Mallory – HTTP/HTTPS Proxy Over SSH

[ad_1] HTTP/HTTPS proxy over SSH. Installation Local machine: go get github.com/justmao945/mallory/cmd/mallory Remote server: need our old friend sshd Configueration Config fileDefault path is $HOME/.config/mallory.json, can

Read More »
Gosec - Golang Security Checker
Hacker Tools
cybarrior

Gosec – Golang Security Checker

[ad_1] Inspects source code for security problems by scanning the Go AST. Install CI Installation # binary will be $GOPATH/bin/goseccurl -sfL https://raw.githubusercontent.com/securego/gosec/master/install.sh | sh -s

Read More »
UBoat - HTTP Botnet Project
Hacker Tools
cybarrior

UBoat – HTTP Botnet Project

[ad_1] A POC HTTP Botnet designed to replicate a full weaponised commercial botnet DisclaimerThis project should be used for authorized testing or educational purposes only.The

Read More »
Arjun v1.6 - HTTP Parameter Discovery Suite
Hacker Tools
cybarrior

Arjun v1.6 – HTTP Parameter Discovery Suite

[ad_1] IntroductionWeb applications use parameters (or queries) to accept user input, take the following example into considerationhttp://api.example.com/v1/userinfo?id=751634589This URL seems to load user information for a

Read More »
Information Gathering
cybarrior

RTS – Real Time Scrapper

RTS (Realtime scrapper) is a tool developed to scrap all pasties,github,reddit..etc in real time to identify occurrence of search terms configured. Upon match an email

Read More »
h4a
cybarrior

Is your VPN Legit or Shit?

Those of you who frequent the darkweb should be familiar with VPN (Virtual Private Network) services and have done some research to find a trustworthy

Read More »
Tricks
cybarrior

IDM Alternative for Kali Linux

Xtreme Download Manager is a powerful tool to increase download speed up-to 500%, save streaming videos from YouTube, Metacafe, Daily-Motion, Google Video or any other

Read More »
Penetration Testing
cybarrior

Web Server Penetration Testing Checklist

Web server pen testing performing under 3 major category which is identity, Analyse and Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.

Read More »
Cyber Awareness
cybarrior

Top 10 Cyber Security Podcasts

Production values aside, IT podcasts are frequently guilty of treating the audience like they are either an 83-year-old grandmother with only the vaguest notion of

Read More »
h4a
cybarrior

Qubes OS 4.0.1 Releases

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Qubes is free

Read More »
Self Hosted
cybarrior

Best Self Hosted Alternatives

Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers. This is a long list of Free Software network

Read More »
VPN
cybarrior

NordVPN Review

NordVPN is a very popular VPN service with a large customer base. While it is highly recommended on many sites, it can be difficult to

Read More »
VPN
cybarrior

VPN.ac Review

VPN.ac is a Romania-based VPN service that provides users with advanced encryption, very secure apps, and excellent performance. Their network consists entirely of dedicated bare-metal servers

Read More »
Cyber Awareness
cybarrior

5 Eyes, 9 Eyes, 14 Eyes – Explained

In short, these are just international surveillance alliances representing various countries around the world. These surveillance alliances work together to collect and share mass surveillance

Read More »
Hacking News
cybarrior

Avengers: Endgame Leaked Online

Marvel’s latest and perhaps the most anticipated flick ever to be released Avengers: End Game has become an object of controversy lately as hackers and

Read More »
Hardware Hacking
cybarrior

Lan Turtle – MiTM Usb Ethernet Adapter

The LAN Turtle is a covert Systems Administration and Pentesting tool providing stealth remote access, network intelligence gathering, and MiTM (man-in-the-middle) surveillance capabilities through a

Read More »
Mobile hacking
cybarrior

Best Android Hack Codes

Secret hack codes are usually hidden from users to prevent misuse and exploit. These codes can reveal additional information, run manufacture tests, factory reset, check

Read More »
Malware
cybarrior

APT34 Hacking Tools Leak

As reported by Catalin Climpanu, some of the tools used by OilRig attack group have been leaked by a persona using the “Lab Dookhtegan pseudonym”.

Read More »
Penetration Testing
cybarrior

PTF – Penetration Testers Framework

The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters,

Read More »
Cyber Awareness
cybarrior

SS7 Hack Attack and Counter Measures

Signaling System No. 7 (SS7) is a series of telephony signaling protocols. Also known as CCS7 (Common Channel Signaling System 7) or CCIS7 (Common Channel Interoffice Signaling 7),

Read More »
Enumeration
cybarrior

ZMap – The Internet Scanner

ZMap is an open source single packet network scanner designed for Internet-wide network surveys. On a typical desktop computer with a gigabit Ethernet connection, ZMap

Read More »
Information Gathering
cybarrior

AQUATONE – DNS Reconnaissance

Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based

Read More »