Article: How To Hack Any Amazon Account - published over 11 years ago. Content: As always with any blog post on this website I'm not responsible it you get arrested. This method is incredibly easy for fast thinking,clever and experienced social engineers. It's also a good starting method. With this method you'll be able to get full access to a account. This includes the ability to see credit card details,address and order numbers.... http://trojan7malware.blogspot.com/2013/08/how-to-hack-any-amazon-account.html Published: 2013 08 18 23:01:00 Received: 2023 03 31 23:02:35 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
Article: How To Make A Profitable Botnet - published over 11 years ago. Content: This post is purely for educational reasons. If you follow ANY of these steps and get arrested I am not responsible. This tutorial is designed from a theoretical prospective. The world of botnets and blackhats is seriously messed up. Leave your morals at home.Budget:What's your budget? To get a botnet started you'll need a minimal of 1.5k. This will include ... http://trojan7malware.blogspot.com/2013/08/how-to-make-profitable-botnet.html Published: 2013 08 14 15:24:00 Received: 2021 06 06 09:05:04 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
|
Article: Episode #169: Move Me Maybe - published over 11 years ago. Content: Tim checks the mailbag Carlos IHaveNoLastName writes in asking for a way to move a directory to a new destination. That's easy, but the directory should only be moved if the the directory (at any depth) does NOT contain a file with a specific extenstion. Here is an example of a sample directory structure: SomeTopDir1 |-OtherDir1 | |-File1 | |-File2 | ... http://blog.commandlinekungfu.com/2013/08/episode-169-move-me-maybe.html Published: 2013 08 06 09:00:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Oracle Critical Patch Update Advisory - July 2013 - published over 11 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Published: 2013 07 16 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Call for hacker visual artwork - published over 11 years ago. Content: http://www.zone-h.org/news/id/4744 Published: 2013 07 10 09:06:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
Article: Episode #168: Scan On, You Crazy Command Line - published over 11 years ago. Content: Hal gets back to our roots With one ear carefully tuned to cries of desperation from the Internet, it's no wonder I picked up on this plea from David Nides on Twitter: Request today, we need 2 scan XX terabytes of data across 3k file shares 4any files that have not been MAC since 2012. Then move files to x.— David Nides (@DAVNADS) March 13, 2013 Whenever ... http://blog.commandlinekungfu.com/2013/07/episode-168-scan-on-you-crazy-command.html Published: 2013 07 02 09:00:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Oracle Java SE Critical Patch Update Advisory - June 2013 - published over 11 years ago. Content: http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html Published: 2013 06 18 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Episode #167: Big MAC - published over 11 years ago. Content: Hal checks into Twitter: So there I was, browsing my Twitter timeline and a friend forwarded a link to Jeremy Ashkenas' github site. Jeremy created an alias for changing your MAC address to a random value. This is useful when you're on a public WiFi network that only gives you a small amount of free minutes. Since most of these services keep track by not... http://blog.commandlinekungfu.com/2013/06/episode-167-big-mac.html Published: 2013 06 18 09:00:00 Received: 2023 03 31 08:44:32 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: Utilities Industry in the Cyber Targeting Scope - published over 11 years ago. Content: There's often a lot of rhetoric in the press and in the security community around threats to the utilities industry, and risk exposure surrounding critical infrastructure. We've determined that the utilities industry (power, water, waste) has been, and likely will continue to be, a target for cyber espionage primarily from Chinese APT ... http://www.fireeye.com/blog/threat-research/2013/06/utilities-industry-cyber-targeting-scope.html Published: 2013 06 17 20:40:56 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: [TUT] WAF Bypass Sql Injection - published over 11 years ago. Content: Today I am going to show you how to bypass Web Application Firewalls ( WAF ). I will demonstrate from the Simpliest and most Basic Techniques to the Most Advanced ones! NOTE: If you don’t know SQL Injection, read this first… What is WAF? WAF stands for Web Application Firewall. It is widely used nowadays to detect and defend SQL Inject... http://hacking-share.blogspot.com/2013/06/tut-waf-bypass-sql-injection.html Published: 2013 06 13 13:34:00 Received: 2023 04 02 10:42:10 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Vulnerability Summary for the Week of June 3, 2013 - published over 11 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb13-161 Published: 2013 06 10 21:11:05 Received: 2023 03 17 16:04:21 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
Article: Whonix OS - A complete anonymous TOR OS - published over 11 years ago. Content: About whonix OS :Whonix is a general purpose operating system working on virtual box, Debian GNU/Linux and Tor.Whonix is designed in a way that IP and DNS leaks are not possible, even a malware with administrative rights can not find out User's real IP adress and Location. (Image: GUI Desktop whonix OS) This works by running two virtual machines,one runs... http://hacking-share.blogspot.com/2013/05/whonix-os-complete-anonymous-tor-os.html Published: 2013 05 22 08:48:00 Received: 2024 02 07 05:20:21 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: WAF Bypass Sql Injection Tips - published over 11 years ago. Content: This is for who knows sql injection. Sometimes there will be a 403 forbidden error or not acceptable error its because of the WAF (web application firewall) you can bypass this by using the following queries. If u dont know sql injection you can learn it HERE Order By Not Working? You can simply bypass it by using group by instead of order by Union Sel... http://hacking-share.blogspot.com/2013/05/waf-bypass-sql-injection-tips.html Published: 2013 05 16 17:39:00 Received: 2023 04 02 10:42:10 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: BLIND and TIME-BASED SQL INJECTIONS - published over 11 years ago. Content: In today’s tutorial I will be doing my best to show you some examples of how to perform BLIND SQL Injections to extract information from a vulnerable backend database. This method is a little harder than the UNION method but is still very viable in the wild, if you are patient enough to stick with it to the end. I will follow similar form as previous tutor... http://hacking-share.blogspot.com/2013/05/blind-and-time-based-sql-injections.html Published: 2013 05 08 09:43:00 Received: 2023 04 02 10:42:10 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
Article: JAVA SIGNED APPLET EXPLOIT - published over 11 years ago. Content: This exploit dynamically creates a .jar file via the Msf:: Exploit::Java mixin, then signs the it. The resulting signed applet is presented to the victim via a web page with an applet tag. The victim’s JVM will pop a dialog asking if they trust the signed applet. On older versions the dialog will display the value of CERTCN in the “Publisher” line. Newe... http://hacking-share.blogspot.com/2013/05/java-signed-applet-exploit.html Published: 2013 05 06 10:05:00 Received: 2024 02 07 05:20:21 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: How To Crack a Program Step By Step - published over 11 years ago. Content: welcome to my tutorial on how to crack a program step by step!!in this tutorial i'm taking the example of keygenme.exe on how to crack!first of all download w32asm and hiew!!Google them!! extract it to desktop!!1) then place KeygenMe.exe, HIEW32.exe from Hiew folder and put folder W32Dasm 8 on desktop and then click on keygenMe.exe and enter any value ... http://hacking-share.blogspot.com/2013/04/how-to-crack-program-step-by-step.html Published: 2013 04 30 14:04:00 Received: 2023 04 02 10:42:11 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: C++ HOW TO PROGRAM 8TH EDITION BY PAUL DEITEL - published over 11 years ago. Content: Ebook Info:-Publication Date: March 25, 2011 | ISBN-10: 0132662361 | ISBN-13: 978-0132662369 | Edition: 8Size ("56.21 Mb")Download : http://www.2shared.com/complete/djitC772/C_How_to_Program_8th_edition__.html Download : mediafire ... http://hacking-share.blogspot.com/2013/04/c-how-to-program-8th-edition-by-paul.html Published: 2013 04 24 10:34:00 Received: 2023 04 02 10:42:11 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Windows Forensic Analysis Toolkit - published over 11 years ago. Content: DOWNLOAD: http://www.mediafire.com/?q9vylwwfyq8zyig ... http://hacking-share.blogspot.com/2013/04/windows-forensic-analysis-toolkit.html Published: 2013 04 22 22:11:00 Received: 2023 04 02 10:42:11 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
Article: Metasploit Pentesting cookbook - published over 11 years ago. Content: Set up a complete penetration testing environment using metasploit and virtual machines. Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc. Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes Avail of exclusive cov... http://hacking-share.blogspot.com/2013/04/metasploit-pentesting-cookbook.html Published: 2013 04 19 16:02:00 Received: 2023 04 02 10:42:11 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - April 2013 - published over 11 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html Published: 2013 04 16 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Java SE Critical Patch Update Advisory - April 2013 - published over 11 years ago. Content: http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html Published: 2013 04 16 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: How to Cheat at Securing Linux - published over 11 years ago. Content: Publisher: SyngressPap/Onl editionSeptember 30, 2007Language: EnglishISBN-10: 1597492078PDF430 Pages8.19 MBAre you one of the millions of SysAdmins running a Linux server who can't find a current book on Linux security? Well..this is the book for you. How to Cheat at Securing Linux Servers is designed to help you deploy a Linux system on the Internet in... http://hacking-share.blogspot.com/2013/04/how-to-cheat-at-securing-linux.html Published: 2013 04 15 15:41:00 Received: 2023 04 02 10:42:12 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
Article: WordPress and Joomla Shell Finder - published over 11 years ago. Content: The WordPress and Joomla Shell Finder is a project byIndian Cyber Hunters to help WordPress and Joomla admins to find malicious PHP scripts used to hacker/defacers to gain unauthorized access their websites. This tool is written in PERL, so in order to run this script, firstly you have to install the Perl package when can be found HereScript Name : ShellFi... http://hacking-share.blogspot.com/2013/04/wordpress-and-joomla-shell-finder.html Published: 2013 04 14 20:23:00 Received: 2023 04 02 10:42:12 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Gr3eNoX Exploit Scanner SQLi/XSS/LFi/RFi v1.1 - published over 11 years ago. Content: Updates XSS Scanner RFi Scanner Bug fixed Remove Duplicate algoritm chanded Virus Scans:http://elementscanner.net//?RE=96825...d4ebb04cae10b5https://www.virustotal.com/file/7c23...is/1339689371/ Download: http://localhostr.com/kX3lVjuVOOmd ... http://hacking-share.blogspot.com/2013/04/gr3enox-exploit-scanner-sqlixsslfirfi.html Published: 2013 04 12 15:20:00 Received: 2024 03 20 20:02:39 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: The Social-Engineer Toolkit (SET) v4.7 released - published over 11 years ago. Content: https://thntools999.blogspot.com/2013/03/the-social-engineer-toolkit-set-v47.html Published: 2013 03 15 18:10:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Episode #166: Ping A Little Log For Me - published over 11 years ago. Content: We've been away for a while because, frankly, we ran out of material. In the meantime we tried to come up with some new ideas and there have had a few requests, but sadly they were all redundant, became scripts, or both. We've been looking long and hard for Fu that works in this format, and we've finally found it! Nathan Sweaney wrote in with a great idea! ... http://blog.commandlinekungfu.com/2013/03/episode-166-ping-little-log-for-me.html Published: 2013 03 12 09:00:00 Received: 2023 03 31 08:44:33 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Biggest password cracking wordlist with millions of words - published over 11 years ago. Content: https://thntools999.blogspot.com/2013/03/biggest-password-cracking-wordlist-with.html Published: 2013 03 10 17:01:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Phrozen Keylogger Lite v1.0 download - published over 11 years ago. Content: https://thntools999.blogspot.com/2013/03/phrozen-keylogger-lite-v10-download.html Published: 2013 03 10 06:27:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: Pentoo 2013.0 RC1.1 Released - published over 11 years ago. Content: https://thntools999.blogspot.com/2013/03/pentoo-20130-rc11-released.html Published: 2013 03 10 06:21:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Snort 2.9.4.1 - Network intrusion detection system - published over 11 years ago. Content: https://thntools999.blogspot.com/2013/03/snort-2941-network-intrusion-detection.html Published: 2013 03 05 07:46:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Oracle Security Alert for CVE-2013-1493 - 04 Mar 2013 - published over 11 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html Published: 2013 03 04 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Updated Release of the Oracle Java SE Critical Patch Update - February 2013 - published almost 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html Published: 2013 02 19 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Mandiant Exposes APT1 – One of China's Cyber Espionage Units & Releases 3,000 Indicators - published almost 12 years ago. Content: Today, The Mandiant® Intelligence Center™ released an unprecedented report exposing APT1's multi-year, enterprise-scale computer espionage campaign. APT1 is one of dozens of threat groups Mandiant tracks around the world and we consider it to be one of the most prolific in terms of the sheer quantity of information it has stolen. Highlig... http://www.fireeye.com/blog/threat-research/2013/02/mandiant-exposes-apt1-chinas-cyber-espionage-units.html Published: 2013 02 19 07:00:45 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Recon-ng : Web Reconnaisance framework for Penetration testers - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/recon-ng-web-reconnaisance-framework.html Published: 2013 02 17 17:12:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: Unhide Forensic Tool, Find hidden processes and ports - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/unhide-forensic-tool-find-hidden.html Published: 2013 02 15 17:39:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: WAppEx v2.0 : Web Application exploitation Tool - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/wappex-v20-web-application-exploitation.html Published: 2013 02 15 17:15:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Password Cracker Tool Hashkill version 0.3.1 released - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/password-cracker-tool-hashkill-version.html Published: 2013 02 15 17:02:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: Weevely : Stealth PHP web shell with telnet style console - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/weevely-stealth-php-web-shell-with.html Published: 2013 02 15 16:48:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Automated HTTP Enumeration Tool - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/automated-http-enumeration-tool.html Published: 2013 02 15 16:07:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: BlindElephant – Web Application Fingerprinting - published almost 12 years ago. Content: https://thntools999.blogspot.com/2013/02/blindelephant-web-application.html Published: 2013 02 15 14:47:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: Oracle Java SE Critical Patch Update Advisory - February 2013 - published almost 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html Published: 2013 02 01 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Critical Patch Update Advisory - January 2013 - published almost 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html Published: 2013 01 15 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Security Alert for CVE-2013-0422 - 13 Jan 2013 - published almost 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2013-0422-1896849.html Published: 2013 01 13 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: An AWK-ward Response - published almost 12 years ago. Content: A couple of weeks ago I promised some answers to the exercises I proposed at the end of my last post. What we have here is a case of, "Better late than never!" 1. If you go back and look at the example where I counted the number of processes per user, you'll notice that the "UID" header from the ps command ends up being counted. How would you suppress this... http://blog.commandlinekungfu.com/2013/01/an-awk-ward-response.html Published: 2013 01 07 00:29:00 Received: 2023 03 31 08:44:33 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
|
Article: AWK-ward! - published almost 12 years ago. Content: Yesterday I got an email friend who complained that "awk is still a mystery". Not being one to ignore a cry for help with the command line, I was motivated to write up a simple introduction to the basics of awk. But where to post it? I know! We've got this little blog we're not doing anything with at the moment (er, yeah, sorry about that folks-- life's ... http://blog.commandlinekungfu.com/2012/12/awk-ward.html Published: 2012 12 20 05:01:00 Received: 2023 03 31 08:44:33 Feed: Command Line Kung Fu Source: Command Line Kung Fu Category: News Topic: Security Tooling |
Article: Another Ebay permanent XSS - published about 12 years ago. Content: http://www.xssed.com/news/131/Another_Ebay_permanent_XSS/ Published: 2012 11 13 18:25:59 Received: 2021 06 06 09:00:29 Feed: XSSed syndication Source: XSSed syndication Category: Alerts Topic: Vulnerabilities |
|
Article: PwnStar latest version with new Exploits released - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html Published: 2012 11 10 15:53:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html Published: 2012 11 10 15:42:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html Published: 2012 11 10 15:30:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html Published: 2012 11 10 15:21:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html Published: 2012 11 10 15:13:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: PySQLi - Python SQL injection framework - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html Published: 2012 11 04 18:03:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html Published: 2012 11 04 12:32:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html Published: 2012 11 03 21:45:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html Published: 2012 11 03 21:37:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html Published: 2012 11 03 21:21:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
Article: Wifi Honey - Creates fake APs using all encryption - published about 12 years ago. Content: https://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html Published: 2012 11 03 21:13:00 Received: 2021 06 06 09:05:31 Feed: Penetration Testing and Security Tools Download Source: Penetration Testing and Security Tools Download Category: News Topic: Security Tooling |
|
Article: Vulnerability Summary for the Week of October 22, 2012 - published about 12 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb12-303 Published: 2012 10 29 21:10:57 Received: 2023 03 17 14:24:46 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
|
Article: Oracle Java SE Critical Patch Update Advisory - October 2012 - published about 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html Published: 2012 10 16 19:26:29 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Oracle Critical Patch Update Advisory - October 2012 - published about 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html Published: 2012 10 16 19:26:29 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Incident Response with NTFS INDX Buffers – Part 1: Extracting an INDX Attribute - published about 12 years ago. Content: By William Ballenthin & Jeff Hamm On August 30, 2012, we presented a webinar on how to use INDX buffers to assist in an incident response investigation. During the Q&A portion of the webinar we received many questions; however, we were not able to answer all of them. We're going to attempt to answer the remaining question... http://www.fireeye.com/blog/threat-research/2012/09/striking-gold-incident-response-ntfs-indx-buffers-part-1.html Published: 2012 09 18 23:23:24 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Hacker diagnosed with brain cancer, hacks the closed source report distributing it to the open source community hoping to get some help - published about 12 years ago. Content: http://www.zone-h.org/news/id/4743 Published: 2012 09 09 17:26:00 Received: 2021 06 06 09:05:22 Feed: Zone-H.org News Source: Zone-H.org News Category: Cyber Security Topic: Cyber Security |
Article: Oracle Security Alert for CVE-2012-4681 - 30 Aug 2012 - published about 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html Published: 2012 08 30 19:26:29 Received: 2021 06 06 09:03:28 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Security Alert for CVE-2012-3132 - 10 Aug 2012 - published over 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2012-3132-1721017.html Published: 2012 08 10 19:14:29 Received: 2021 06 06 09:03:28 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Critical Patch Update (CPU) Advisory - July 2012 - published over 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html Published: 2012 07 19 22:15:29 Received: 2021 06 06 09:03:28 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Vulnerability Summary for the Week of June 25, 2012 - published over 12 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb12-184 Published: 2012 07 02 21:10:50 Received: 2023 03 16 19:24:27 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
|
Article: Oracle Java SE Critical Patch Update Advisory - June 2012 - published over 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html Published: 2012 06 12 20:00:00 Received: 2021 06 06 09:03:28 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: M-Trends #1: Malware Only Tells Half the Story - published over 12 years ago. Content: When I joined Mandiant earlier this year, I was given the opportunity to help write our annual M-Trends report. This is the third year Mandiant has published the report, which is a summary of the trends we've observed in our investigations over the last twelve months. I remember reading Mandiant's first M-Trends report when it ca... http://www.fireeye.com/blog/threat-research/2012/05/mtrends-1-malware-tells-story.html Published: 2012 05 14 20:45:15 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Oracle Security Alert for CVE-2012-1675 - published over 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html Published: 2012 04 30 20:01:09 Received: 2021 06 06 09:03:28 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Oracle Critical Patch Update (CPU) Advisory - April 2012 - published over 12 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html Published: 2012 04 18 15:40:13 Received: 2021 06 06 09:03:28 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Click to Open Code Editor