The SamSara Market Homescreen
Darkweb
cybarrior

The Admin of SamSara Market is Gone

SamSara Market, the official yet unofficial successor to Dream Market, has been down for several days without any explanation from the market’s administration. The administrator

Read More »
Rsdl - Subdomain Scan With Ping Method
Hacker Tools
cybarrior

Rsdl – Subdomain Scan With Ping Method

Subdomain Scan With Ping Method. Flags Value Description –hostname example.com Domain for scan. –output Records the output with the domain name. –list /tmp/lists/example.txt Lister for

Read More »
HAL - The Hardware Analyzer
Hacker Tools
cybarrior

HAL – The Hardware Analyzer

HAL [/hel/] is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes with a fully-fledged plugin

Read More »
Mallory - HTTP/HTTPS Proxy Over SSH
Hacker Tools
cybarrior

Mallory – HTTP/HTTPS Proxy Over SSH

HTTP/HTTPS proxy over SSH. Installation Local machine: go get github.com/justmao945/mallory/cmd/mallory Remote server: need our old friend sshd Configueration Config fileDefault path is $HOME/.config/mallory.json, can be

Read More »
Gosec - Golang Security Checker
Hacker Tools
cybarrior

Gosec – Golang Security Checker

Inspects source code for security problems by scanning the Go AST. Install CI Installation # binary will be $GOPATH/bin/goseccurl -sfL https://raw.githubusercontent.com/securego/gosec/master/install.sh | sh -s —

Read More »
UBoat - HTTP Botnet Project
Hacker Tools
cybarrior

UBoat – HTTP Botnet Project

A POC HTTP Botnet designed to replicate a full weaponised commercial botnet DisclaimerThis project should be used for authorized testing or educational purposes only.The main

Read More »
Arjun v1.6 - HTTP Parameter Discovery Suite
Hacker Tools
cybarrior

Arjun v1.6 – HTTP Parameter Discovery Suite

IntroductionWeb applications use parameters (or queries) to accept user input, take the following example into considerationhttp://api.example.com/v1/userinfo?id=751634589This URL seems to load user information for a specific

Read More »
Information Gathering
cybarrior

RTS – Real Time Scrapper

RTS (Realtime scrapper) is a tool developed to scrap all pasties,github,reddit..etc in real time to identify occurrence of search terms configured. Upon match an email

Read More »
h4a
cybarrior

Is your VPN Legit or Shit?

Those of you who frequent the darkweb should be familiar with VPN (Virtual Private Network) services and have done some research to find a trustworthy

Read More »
Tricks
cybarrior

IDM Alternative for Kali Linux

Xtreme Download Manager is a powerful tool to increase download speed up-to 500%, save streaming videos from YouTube, Metacafe, Daily-Motion, Google Video or any other

Read More »
Penetration Testing
cybarrior

Web Server Penetration Testing Checklist

Web server pen testing performing under 3 major category which is identity, Analyse and Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.

Read More »
Cyber Awareness
cybarrior

Top 10 Cyber Security Podcasts

Production values aside, IT podcasts are frequently guilty of treating the audience like they are either an 83-year-old grandmother with only the vaguest notion of

Read More »
h4a
cybarrior

Qubes OS 4.0.1 Releases

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Qubes is free

Read More »
Self Hosted
cybarrior

Best Self Hosted Alternatives

Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers. This is a long list of Free Software network

Read More »
VPN
cybarrior

NordVPN Review

NordVPN is a very popular VPN service with a large customer base. While it is highly recommended on many sites, it can be difficult to

Read More »
VPN
cybarrior

VPN.ac Review

VPN.ac is a Romania-based VPN service that provides users with advanced encryption, very secure apps, and excellent performance. Their network consists entirely of dedicated bare-metal servers

Read More »
Cyber Awareness
cybarrior

5 Eyes, 9 Eyes, 14 Eyes – Explained

In short, these are just international surveillance alliances representing various countries around the world. These surveillance alliances work together to collect and share mass surveillance

Read More »
Hacking News
cybarrior

Avengers: Endgame Leaked Online

Marvel’s latest and perhaps the most anticipated flick ever to be released Avengers: End Game has become an object of controversy lately as hackers and

Read More »
Hardware Hacking
cybarrior

Lan Turtle – MiTM Usb Ethernet Adapter

The LAN Turtle is a covert Systems Administration and Pentesting tool providing stealth remote access, network intelligence gathering, and MiTM (man-in-the-middle) surveillance capabilities through a

Read More »
Mobile hacking
cybarrior

Best Android Hack Codes

Secret hack codes are usually hidden from users to prevent misuse and exploit. These codes can reveal additional information, run manufacture tests, factory reset, check

Read More »
Malware
cybarrior

APT34 Hacking Tools Leak

As reported by Catalin Climpanu, some of the tools used by OilRig attack group have been leaked by a persona using the “Lab Dookhtegan pseudonym”.

Read More »
Penetration Testing
cybarrior

PTF – Penetration Testers Framework

The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters,

Read More »
Cyber Awareness
cybarrior

SS7 Hack Attack and Counter Measures

Signaling System No. 7 (SS7) is a series of telephony signaling protocols. Also known as CCS7 (Common Channel Signaling System 7) or CCIS7 (Common Channel Interoffice Signaling 7),

Read More »
Enumeration
cybarrior

ZMap – The Internet Scanner

ZMap is an open source single packet network scanner designed for Internet-wide network surveys. On a typical desktop computer with a gigabit Ethernet connection, ZMap

Read More »
Information Gathering
cybarrior

AQUATONE – DNS Reconnaissance

Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based

Read More »
Incident Response
cybarrior

RedELK – Red Team’s SIEM

Red Team’s SIEM – easy deployable tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability for

Read More »
IOT Hacking
cybarrior

MQTT-PWN: Your IoT Swiss-Army Knife

MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations, as it combines enumeration, supportive functions and exploitation modules while packing

Read More »
TOR
cybarrior

Tor Browser 8.0.8 Released

The Tor Project, the organization behind the anonymity-focused Tor browser, has announced yet another release. The Tor browser 8.0.8 is now available for use.

Read More »
Cheatsheets
cybarrior

Wireshark Cheatsheet

Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and

Read More »
CTF
cybarrior

SickOS 1.2 – CTF Walkthrough

SickOS 1.2 is the second Boot2Root Challenge in SickOS Series and is available at Vulnhub. This is an interesting CTF and requires think-out-of-the-box mentality. This

Read More »
Denial of Service
cybarrior

Xerxes – Best DoS Tool 2019

Xerxes is the most powerful DOS tool of 2019 and comes with enhanced features for stress testing. It provides the capacity to launch multiple independent

Read More »
Cheatsheets
cybarrior

Metasploit Cheat Sheet

The Metasploit Project is a computer security project that provides information on vulnerabilities, helping in the development of penetration tests and IDS signatures. Metasploit is

Read More »
Bruteforce
cybarrior

Password Cracker THC Hydra

You think your passwords are strong and secure? You are mistaken! There are numerous options to secure your password, but when it comes to the

Read More »
System Administration
cybarrior

DMARC Email Validation System

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a standard that helps protect email senders and recipients from spoofing, spam and phishing. With this, mail

Read More »
System Administration
cybarrior

DKIM Email Security Standard

DKIM email security standard was designed to make sure messages were not altered or compromised in transit between sender and receiver. It uses public-key cryptography

Read More »
Operating Systems
cybarrior

Kali Linux 2019.1 Release

Since the first release in 2013 with 1.0.0, Kali Linux has updated 24 different versions with many upgrades and bug fixes. Here we will take

Read More »
Enumeration
cybarrior

Nikto – Web Server Scanner

Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks

Read More »
Enumeration
cybarrior

Fierce – DNS reconnaissance tool

Fierce is a semi-lightweight scanner that helps locate non-contiguous IP space and hostnames against specified domains. It’s really meant as a pre-cursor to nmap, unicornscan,

Read More »
Ebooks
cybarrior

Reversing: Secrets of Reverse Engineering

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book

Read More »
Ebooks
cybarrior

The Art of Memory Forensics

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes.

Read More »

Can Hackers Be Heroes?

Can Hackers Be Heroes is a short documentary film from PBS Digital Studio. Many people think of hackers as cyber criminals, breaking into computer systems

Read More »
Documentary
cybarrior

Cyber War (Documentary Film)

Cyber War is a documentary film from Al Jazeera media network. The film is all about US cyber security and state-sponsored hacking attacks.

Read More »
Documentary
cybarrior

Zero Days (Documentary Film)

Zero Days is a documentary film produced by VPRO. The film talks about cyber security and online black markets. Zero Days paints a frightening portrait of

Read More »
IOT Hacking
cybarrior

Heathen – IoT Pentesting Framework

Heathen Internet of Things Penetration Testing Framework developed as a research project, which automatically help developers and manufacturers build more secure products in the Internet

Read More »
Documentary
cybarrior

Naked Citizens Documentary

Naked Citizens is a documentary film that shows how online and CCTV surveillance data is being used to arrest “terror suspects”.

Read More »