yarAnalyzer – Yara Rule Analyzer and Statistics Generator

yarAnalyzer is a Python-based YARA rule analyzer that can also generate statistics from yara rulesets. It also has an inventory creation feature that can output a CSV file detailing the rules. It creates statistics on a YARA rule set and files in a sample directory. Place some signatures with .yar extension in the “signatures” folder…

Read the full post at darknet.org.uk

Continue reading yarAnalyzer – Yara Rule Analyzer and Statistics Generator

Prisoners Hack Prison From Inside Prison

Prisoners Hack Prison! Sounds exciting right? This time it’s actually pretty entertaining with the prisoners managing to hack a prison network from INSIDE the prison using scavenged PC parts from a rehabilitation class. Some pretty resourceful guys managing to build 2 functional PCs from scrapped parts AND connect to the prison network AND try and…

Read the full post at darknet.org.uk

Continue reading Prisoners Hack Prison From Inside Prison

spectrology – Basic Audio Steganography Tool

spectrology is a Python-based audio steganography tool that can convert images to audio files with a corresponding spectrogram encoding, this allows you to hide hidden messages via images inside audio files. Using this tool you can select range of freq… Continue reading spectrology – Basic Audio Steganography Tool

spectrology – Basic Audio Steganography Tool

spectrology is a Python-based audio steganography tool that can convert images to audio files with a corresponding spectrogram encoding, this allows you to hide hidden messages via images inside audio files. Using this tool you can select range of freq… Continue reading spectrology – Basic Audio Steganography Tool

PowerMemory – Exploit Windows Credentials In Memory

PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows. The method is totally new. It proves that it can be extremely easy to get credentials or any other i… Continue reading PowerMemory – Exploit Windows Credentials In Memory

Microsoft Azure Web Application Firewall (WAF) Launched

Not too long after Amazon launched their cloud protection WAF the Microsoft Azure Web Application Firewall (WAF) has been made generally available in all public Azure DCs. It’s a good move with the majority of websites and services moving into one of the big 3 cloud providers (AWS, Google or Azure) and the vast majority […]

The post…

Read the full post at darknet.org.uk

Continue reading Microsoft Azure Web Application Firewall (WAF) Launched

HashData – A Command-line Hash Identifying Tool

HashData is a Ruby-based command-line REPL Hash Identifying Tool with support for a lot of different (most popular) hash types. Installation [crayon-58e26b817a229098010721/] Usage Command Line When installed, run hashdata and paste in hashes when promp… Continue reading HashData – A Command-line Hash Identifying Tool

European Commission Pushing For Encryption Backdoors

The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ backdoor keys. This is now getting more serious in Europe with the EC actually forcing the issue (in a passive aggressive kind of way…

Read the full post at darknet.org.uk

Continue reading European Commission Pushing For Encryption Backdoors

European Commission Pushing For Encryption Backdoors

The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ backdoor keys. This is now getting more serious in Europe with the EC actually forcing the issue (in a passive aggressive kind of way…

Read the full post at darknet.org.uk

Continue reading European Commission Pushing For Encryption Backdoors

HashPump – Exploit Hash Length Extension Attack

HashPump is a C++ based command line tool to exploit the Hash Length Extension Attack with various hash types supported, including MD4, MD5, SHA1, SHA256, and SHA512. There’s a good write-up of how to use this in practical terms here: Plaid CTF 2014: mtpox Usage [crayon-58d9345a724a6910508053/] You can download HashPump here:…

Read the full post at darknet.org.uk

Continue reading HashPump – Exploit Hash Length Extension Attack