DET – Data Exfiltration Toolkit

DET is a proof of concept Data Exfiltration Toolkit using either single or multiple channel(s) at the same time. The idea behind DET was to create a generic tool-kit to plug any kind of protocol/service to test implemented Network Monitoring and Data L… Continue reading DET – Data Exfiltration Toolkit

Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

A Security researcher has discovered a unique attack method that can be used to steal credentials from a locked computer (but, logged-in) and works on both Windows as well as Mac OS X systems.

In his blog post published today, security expert Rob Full… Continue reading Here’s How to Hack Windows/Mac OS X Login Password (When Locked)

miranda-upnp – Interactive UPnP Client

Miranda is a Python-based UPnP (Universal Plug-N-Play) client application designed to discover, query and interact with UPNP devices, particularly Internet Gateway Devices (aka, routers). It can be used to audit UPNP-enabled devices on a network for po… Continue reading miranda-upnp – Interactive UPnP Client

fping 3 – Multi Target ICMP Ping Tool

fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. fping differs from ping in that you can specify any number of targets on the command line, or specify a file containing the lists of targets to ping. Instead of sending […]

The post fping 3 –…

Read the full post at darknet.org.uk

Continue reading fping 3 – Multi Target ICMP Ping Tool

WOL-E – Wake On LAN Security Testing Suite

WOL-E is a suite of tools for Wake on LAN security testing related to the WOL features of network attached computers, this is now enabled by default on many Apple computers. This allows you to easily scan for Apple devices on a network (based on their MAC addresses). Features These tools include: Bruteforcing the MAC […]

The post WOL-E…

Read the full post at darknet.org.uk

Continue reading WOL-E – Wake On LAN Security Testing Suite

dnmap – Distributed Nmap Framework

dnmap is a distributed Nmap framework which can hand off Nmap scans to several clients. It reads an already created file with Nmap commands and send those commands to each client connected to it. The framework use a client/server architecture. The server knows what to do and the clients do it. All the logic and […]

The post dnmap –…

Read the full post at darknet.org.uk

Continue reading dnmap – Distributed Nmap Framework

DMitry – Deepmagic Information Gathering Tool

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host. DMitry has a base functionality with the ability to add new functions, t… Continue reading DMitry – Deepmagic Information Gathering Tool

Automater – IP & URL OSINT Tool For Analysis

Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the … Continue reading Automater – IP & URL OSINT Tool For Analysis

STOP Rule 41 — FBI should not get Legal Power to Hack Computers Worldwide

We have been hearing a lot about Rule 41 after the US Department of Justice has pushed an update to the rule.

The change to the Rule 41 of the Federal Rules of Criminal Procedure grants the FBI much greater powers to hack legally into any computer acr… Continue reading STOP Rule 41 — FBI should not get Legal Power to Hack Computers Worldwide

Criminal Rings Hijacking Unused IPv4 Address Spaces

So apparently this Hijacking Unused IPv addresses has been going on for a while, but with quite a lot number of attempts recently it’s ramped up a LOT since the September announcement by ARIN about IPv4 depletion. There was only only 50 hijacking attempts between 2005 and 2015. Since September, ARIN has already seen 25 […]

The post Criminal…

Read the full post at darknet.org.uk

Continue reading Criminal Rings Hijacking Unused IPv4 Address Spaces