Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 2,120

Topic: Security Tooling

Articles recieved 06/06/2021
Article: Episode #159: Portalogical Exam - published over 12 years ago.
Content: Tim finally has an ideaSadly, we've been away for two weeks due to lack of new, original ideas for posts. BUT! I came up with and idea. Yep, all by myself too. (By the way, if you have an idea for an episode send it in)During my day job pen testing, I regularly look at nmap results to see what services are available. I like to get a high level look at the op...
http://blog.commandlinekungfu.com/2011/10/episode-159-portalogical-exam.html 
🔥🔥
 
Published: 2011 10 04 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #160: Plotting to Take Over the World - published over 12 years ago.
Content: Hal's been teachingWhew! Just got done with another week of teaching, this time at SANS Baltimore. I even got a chance to give my "Return of Command Line Kung Fu" talk, so I got a bunch of shell questions.One of my students had a very interesting challenge. To help analyze malicious PDF documents, he was trying to parse the output of Didier Stevens' pdf-p...
http://blog.commandlinekungfu.com/2011/10/episode-160-plotting-to-take-over-world.html 
🔥🔥
 
Published: 2011 10 18 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #161: Cleaning up the Joint - published over 12 years ago.
Content: Hal's got emailApparently tired of emailing me after we post an Episode, Davide Brini decided to write us with a challenge based on a problem he had to solve recently. Davide had a directory full of software tarballs with names like:package-foo-10006.tar.gzpackage-foo-10009.tar.gzpackage-foo-8899.tar.gzpackage-foo-9998.tar.gzpackage-bar-3235.tar.gzpackage-b...
http://blog.commandlinekungfu.com/2011/11/episode-161-cleaning-up-joint.html 
🔥🔥
 
Published: 2011 11 08 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #162: Et Tu Bruteforce - published over 12 years ago.
Content: Tim is looking for a way inA few weeks ago I got a call from a Mr 53, of LaNMaSteR53 fame from the pauldotcom blog. Mister, Tim "I have a very cool first name" Tomes was working on a way to brute force passwords. The scenario is hundreds (or more) accounts were created all (presumably) using the same initial password. He noticed all the accounts were created...
http://blog.commandlinekungfu.com/2011/11/episode-162-et-tu-bruteforce.html 
🔥🔥
 
Published: 2011 11 15 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #163: Pilgrim's Progress - published over 12 years ago.
Content: Tim checks the metamail:I hope everyone had a good Thanksgiving. I know I did, and I sure have a lot to be thankful for.Today we receive mail about mail. Ed writes in about Rob VandenBrink writing in:Gents,Rob VandenBrink sent me a cool idea this morning. It's for printing out a text-based progress indicator in cmd.exe. The idea is that if you have a loop ...
http://blog.commandlinekungfu.com/2011/11/episode-163-pilgrims-progress.html 
🔥🔥
 
Published: 2011 11 29 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #164: Exfiltration Nation - published about 12 years ago.
Content: Hal pillages the mailboxHappy 2012 everybody!In the days and weeks to come, the industry press will no doubt be filled with stories of all the high-profile companies whose data was "liberated" during the past couple of weeks. It may be a holiday for most of us, but it's the perfect time for the black hats to be putting in a little overtime with their data e...
http://blog.commandlinekungfu.com/2012/01/episode-164-exfiltration-nation.html 
🔥🔥
 
Published: 2012 01 10 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #165: What's the Frequency Kenneth? - published about 12 years ago.
Content: Tim helps Tim crack the codeLong time reader, second time caller emailer writes in:I've always been interested in mystery and codes (going back to 'Mystery Club' in 7th Grade), and today I discovered a cool show on History Channel called Decoded. They were talking about cryptography, specifically frequency analysis. I'm not an educator here but just to make ...
http://blog.commandlinekungfu.com/2012/01/episode-165-whats-frequency-kenneth.html 
🔥🔥
 
Published: 2012 01 24 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: AWK-ward! - published over 11 years ago.
Content: Yesterday I got an email friend who complained that "awk is still a mystery". Not being one to ignore a cry for help with the command line, I was motivated to write up a simple introduction to the basics of awk. But where to post it? I know! We've got this little blog we're not doing anything with at the moment (er, yeah, sorry about that folks-- life's ...
http://blog.commandlinekungfu.com/2012/12/awk-ward.html 
🔥🔥
 
Published: 2012 12 20 05:01:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: An AWK-ward Response - published about 11 years ago.
Content: A couple of weeks ago I promised some answers to the exercises I proposed at the end of my last post. What we have here is a case of, "Better late than never!" 1. If you go back and look at the example where I counted the number of processes per user, you'll notice that the "UID" header from the ps command ends up being counted. How would you suppress this?...
http://blog.commandlinekungfu.com/2013/01/an-awk-ward-response.html 
🔥🔥
 
Published: 2013 01 07 00:29:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #166: Ping A Little Log For Me - published about 11 years ago.
Content: We've been away for a while because, frankly, we ran out of material. In the meantime we tried to come up with some new ideas and there have had a few requests, but sadly they were all redundant, became scripts, or both. We've been looking long and hard for Fu that works in this format, and we've finally found it! Nathan Sweaney wrote in with a great idea! I...
http://blog.commandlinekungfu.com/2013/03/episode-166-ping-little-log-for-me.html 
🔥🔥
 
Published: 2013 03 12 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #167: Big MAC - published almost 11 years ago.
Content: Hal checks into Twitter: So there I was, browsing my Twitter timeline and a friend forwarded a link to Jeremy Ashkenas' github site. Jeremy created an alias for changing your MAC address to a random value. This is useful when you're on a public WiFi network that only gives you a small amount of free minutes. Since most of these services keep track by noti...
http://blog.commandlinekungfu.com/2013/06/episode-167-big-mac.html 
🔥🔥
 
Published: 2013 06 18 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #168: Scan On, You Crazy Command Line - published over 10 years ago.
Content: Hal gets back to our roots With one ear carefully tuned to cries of desperation from the Internet, it's no wonder I picked up on this plea from David Nides on Twitter: Request today, we need 2 scan XX terabytes of data across 3k file shares 4any files that have not been MAC since 2012. Then move files to x.— David Nides (@DAVNADS) March 13, 2013 Whenever I s...
http://blog.commandlinekungfu.com/2013/07/episode-168-scan-on-you-crazy-command.html 
🔥🔥
 
Published: 2013 07 02 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #169: Move Me Maybe - published over 10 years ago.
Content: Tim checks the mailbag Carlos IHaveNoLastName writes in asking for a way to move a directory to a new destination. That's easy, but the directory should only be moved if the the directory (at any depth) does NOT contain a file with a specific extenstion. Here is an example of a sample directory structure: SomeTopDir1|-OtherDir1| |-File1| |-File2| |-File2|...
http://blog.commandlinekungfu.com/2013/08/episode-169-move-me-maybe.html 
🔥🔥
 
Published: 2013 08 06 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #170: Fearless Forensic File Fu - published over 10 years ago.
Content: Hal receives a cry for help Fellow forensicator Craig was in a bit of a quandary. He had a forensic image in "split raw" format-- a complete forensic image broken up into small pieces. Unfortunately for him, the pieces were named "fileaa", "fileab", "fileac", and so on while his preferred tool wanted the files to be named "file.001", "file.002", "file.003"...
http://blog.commandlinekungfu.com/2013/09/episode-170-fearless-forensic-file-fu.html 
🔥🔥
 
Published: 2013 09 27 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #171: Flexibly Finding Firewall Phrases - published over 10 years ago.
Content: Old Tim answers an old email Patrick Hoerter writes in:I have a large firewall configuration file that I am working with. It comes from that vendor that likes to prepend each product they sell with the same "well defended" name. Each configuration item inside it is multiple lines starting with "edit" and ending with "next". I'm trying to extract only the ...
http://blog.commandlinekungfu.com/2013/10/episode-171-flexibly-finding-firewall.html 
🔥🔥
 
Published: 2013 10 08 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #172: Who said bigger is better? - published over 10 years ago.
Content: Tim sweats the small stuff Ted S. writes in: "I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &c), r...
http://blog.commandlinekungfu.com/2013/11/episode-172-who-said-bigger-is-better.html 
🔥🔥
 
Published: 2013 11 26 09:18:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #173: Tis the Season - published about 10 years ago.
Content: Hal finds some cheer From somewhere near the borders of scriptistan, we send you:function t { for ((i=0; $i < $1; i++)); do s=$((8-$i)); e=$((8+$i)); for ((j=0; j <= $e; j++)); do [ $j -ge $s ] && echo -n '^' || echo -n ' '; done; echo; done}function T { for ((i=0; $i < $1; i++)); do for ((j=0; j < 10...
http://blog.commandlinekungfu.com/2013/12/episode-173-tis-season.html 
🔥🔥
 
Published: 2013 12 31 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #174: Lightning Lockdown - published about 10 years ago.
Content: Hal firewalls fast Recently a client needed me to quickly set up an IP Tables firewall on a production server that was effectively open on the Internet. I knew very little about the machine, and we couldn't afford to break any of the production traffic to and from the box. It occurred to me that a decent first approximation would be to simply look at the net...
http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html 
🔥🔥
 
Published: 2014 01 28 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #175: More Time! We Need More Time! - published about 10 years ago.
Content: Tim leaps in Every four years (or so) we get an extra day in February, leap year. When I was a kid this term confused me. Frogs leap, they leap over things. A leap year should be shorter! Obviously, I was wrong. This extra day can give us extra time to complete tasks (e.g. write blog post), so we are going to use our shells to check if the current year is a ...
http://blog.commandlinekungfu.com/2014/02/episode-175-more-time-we-need-more-time.html 
🔥🔥
 
Published: 2014 02 28 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #176: Step Up to the WMIC - published almost 10 years ago.
Content: Tim grabs the mic: Michael Behan writes in: Perhaps you guys can make this one better. Haven’t put a ton of thought into it: C:\> (echo HTTP/1.0 200 OK & wmic process list full /format:htable) | nc -l -p 3000 Then visit http://127.0.0.1:3000 This could of course be used to generate a lot more HTML reports via wmic that are quick to save from the brows...
http://blog.commandlinekungfu.com/2014/03/episode-176-step-up-to-wmic.html 
🔥🔥
 
Published: 2014 03 31 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #177: There and Back Again - published almost 10 years ago.
Content: Hal finds some old mail Way, way back after Episode #170 Tony Reusser sent us a follow-up query. If you recall, Episode #170 showed how to change files named "fileaa", "fileab", "fileac", etc to files named "file.001", "file.002", "file.003". Tony's question was how to go back the other way-- from "file.001" to "fileaa", "file.002" to "fileab", and so on. ...
http://blog.commandlinekungfu.com/2014/04/episode-177-there-and-back-again.html 
🔥🔥
 
Published: 2014 05 01 01:01:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #178: Luhn-acy - published almost 10 years ago.
Content: Hal limbers up in the dojo To maintain our fighting trim here in the Command Line Kung Fu dojo, we like to set little challenges for ourselves from time to time. Of course, we prefer it when our loyal readers send us ideas, so keep those emails coming! Really... please oh please oh please keep those emails coming... please, please, please... ahem, but I di...
http://blog.commandlinekungfu.com/2014/05/not-ready-yet-episode-178-luhn-acy.html 
🔥🔥
 
Published: 2014 05 26 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #179: The Check is in the Mail - published over 9 years ago.
Content: Tim mails one in: Bob Meckle writes in: I have recently come across a situation where it would be greatly beneficial to build a script to check revocation dates on certificates issued using a certain template, and send an email to our certificate staff letting them know which certificates will expire within the next 6 weeks. I am wondering if you guys have ...
http://blog.commandlinekungfu.com/2014/06/episode-179-check-is-in-mail.html 
🔥🔥
 
Published: 2014 06 30 21:51:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #180: Open for the Holidays! - published about 9 years ago.
Content: Not-so-Tiny Tim checks in with the ghost of Christmas present: I know many of you have been sitting on Santa's lap wishing for more Command Line Kung Fu. Well, we've heard your pleas and are pushing one last Episode out before the New Year! We come bearing a solution for a problem we've all encountered. Ever try to delete or modify a file and receive an err...
http://blog.commandlinekungfu.com/2014/12/episode-180-open-for-holidays.html 
🔥🔥
 
Published: 2014 12 31 12:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #181: Making Contact - published over 6 years ago.
Content: Hal wanders back on stage Whew! Sure is dusty in here!Man, those were the days! It started with Ed jamming on Twitter and me heckling from the audience. Then Ed invited me up on stage (once we built the stage), and that was some pretty sweet kung fu. Then Tim joined the band, Ed left, and the miles, and the booze, and the groupies got to be too much.But we s...
http://blog.commandlinekungfu.com/2017/10/episode-181-making-contact.html 
🔥🔥
 
Published: 2017 10 03 13:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
09:05 Episode #159: Portalogical Exam
🔥🔥
09:05 Episode #160: Plotting to Take Over the World
🔥🔥
09:05 Episode #161: Cleaning up the Joint
🔥🔥
09:05 Episode #162: Et Tu Bruteforce
🔥🔥
09:05 Episode #163: Pilgrim's Progress
🔥🔥
09:05 Episode #164: Exfiltration Nation
🔥🔥
09:05 Episode #165: What's the Frequency Kenneth?
🔥🔥
09:05 AWK-ward!
🔥🔥
09:05 An AWK-ward Response
🔥🔥
09:05 Episode #166: Ping A Little Log For Me
🔥🔥
09:05 Episode #167: Big MAC
🔥🔥
09:05 Episode #168: Scan On, You Crazy Command Line
🔥🔥
09:05 Episode #169: Move Me Maybe
🔥🔥
09:05 Episode #170: Fearless Forensic File Fu
🔥🔥
09:05 Episode #171: Flexibly Finding Firewall Phrases
🔥🔥
09:05 Episode #172: Who said bigger is better?
🔥🔥
09:05 Episode #173: Tis the Season
🔥🔥
09:05 Episode #174: Lightning Lockdown
🔥🔥
09:05 Episode #175: More Time! We Need More Time!
🔥🔥
09:05 Episode #176: Step Up to the WMIC
🔥🔥
09:05 Episode #177: There and Back Again
🔥🔥
09:05 Episode #178: Luhn-acy
🔥🔥
09:05 Episode #179: The Check is in the Mail
🔥🔥
09:05 Episode #180: Open for the Holidays!
🔥🔥
09:05 Episode #181: Making Contact
🔥🔥

Topic: Security Tooling

Articles recieved 06/06/2021
Article: UPDATE: FudgeC2 0.5.7 - published over 3 years ago.
Content: FudgeC2 0.5.7 was released in June and this post documents the changes made to it. As you may remember, this awesome adversary emulation system was listed in my older post titled – List of Open Source C2 Post-Exploitation Frameworks. The new version brings system SMTP support, operations security (OPSEC) improvements, introduces new RESTful endpoints and UI ...
https://pentestit.com/fudgec2-0-5-7-released/ 
🔥🔥
 
Published: 2020 08 13 19:03:38
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
Article: UPDATE: Kali Linux 2020.3 Release - published over 3 years ago.
Content: Kali Linux 2020.3 was released a couple of days ago and this post makes an attempt at understanding the changes in this release. Briefly, the latest version of Kali Linux includes the release Win-Kex, better HiDPI support, standard tool and kernel updates. These are the list of changes since Kali Linux 2020.2 release: New Shell (Upcoming) – By default, Kali ...
https://pentestit.com/kali-linux-2020-3-release-available/ 
🔥🔥
 
Published: 2020 08 27 17:06:12
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
Article: UPDATE: Merlin v0.9.0 - published over 3 years ago.
Content: Merlin v0.9.0 was released a couple of days ago. This release adds support for HTTP and h2c protocols. As we know, the h2c protocol is the non-TLS version of HTTP/2. This release also adds new “Listeners” menu to create and manage multiple listeners. You can now configure agent/listeners to listen on a list of resources and change the Agent JA3 hash on the f...
https://pentestit.com/merlin-v0-9-0-released/ 
🔥🔥
 
Published: 2020 09 16 00:37:04
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
Article: UPDATE: Empire v3.4.0 - published over 3 years ago.
Content: Empire v3.4.0 was released a couple of days ago! I briefly mentioned about this tool in my old post titled – List of Open Source C2 Post-Exploitation Frameworks. This new version brings support for Malleable C2 listeners and reflective file loading among other bug fixes. What is Empire? Empire 3.x is an open source post-exploitation framework that includes a...
https://pentestit.com/empire-v3-4-0-post-exploitation-framework-updated/ 
🔥🔥
 
Published: 2020 09 18 18:30:07
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
09:05 UPDATE: FudgeC2 0.5.7
🔥🔥
09:05 UPDATE: Kali Linux 2020.3 Release
🔥🔥
09:05 UPDATE: Merlin v0.9.0
🔥🔥
09:05 UPDATE: Empire v3.4.0
🔥🔥

Topic: Security Tooling

Articles recieved 06/06/2021
Article: Wifi Honey - Creates fake APs using all encryption - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html 
🔥🔥
 
Published: 2012 11 03 21:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html 
🔥🔥
 
Published: 2012 11 03 21:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html 
🔥🔥
 
Published: 2012 11 03 21:37:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html 
🔥🔥
 
Published: 2012 11 03 21:45:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html 
🔥🔥
 
Published: 2012 11 04 12:32:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PySQLi - Python SQL injection framework - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html 
🔥🔥
 
Published: 2012 11 04 18:03:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html 
🔥🔥
 
Published: 2012 11 10 15:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html 
🔥🔥
 
Published: 2012 11 10 15:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html 
🔥🔥
 
Published: 2012 11 10 15:30:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html 
🔥🔥
 
Published: 2012 11 10 15:42:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnStar latest version with new Exploits released - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html 
🔥🔥
 
Published: 2012 11 10 15:53:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BlindElephant – Web Application Fingerprinting - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/blindelephant-web-application.html 
🔥🔥
 
Published: 2013 02 15 14:47:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Automated HTTP Enumeration Tool - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/automated-http-enumeration-tool.html 
🔥🔥
 
Published: 2013 02 15 16:07:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Weevely : Stealth PHP web shell with telnet style console - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/weevely-stealth-php-web-shell-with.html 
🔥🔥
 
Published: 2013 02 15 16:48:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Password Cracker Tool Hashkill version 0.3.1 released - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/password-cracker-tool-hashkill-version.html 
🔥🔥
 
Published: 2013 02 15 17:02:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: WAppEx v2.0 : Web Application exploitation Tool - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/wappex-v20-web-application-exploitation.html 
🔥🔥
 
Published: 2013 02 15 17:15:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Unhide Forensic Tool, Find hidden processes and ports - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/unhide-forensic-tool-find-hidden.html 
🔥🔥
 
Published: 2013 02 15 17:39:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Recon-ng : Web Reconnaisance framework for Penetration testers - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/02/recon-ng-web-reconnaisance-framework.html 
🔥🔥
 
Published: 2013 02 17 17:12:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Snort 2.9.4.1 - Network intrusion detection system - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/snort-2941-network-intrusion-detection.html 
🔥🔥
 
Published: 2013 03 05 07:46:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Pentoo 2013.0 RC1.1 Released - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/pentoo-20130-rc11-released.html 
🔥🔥
 
Published: 2013 03 10 06:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Phrozen Keylogger Lite v1.0 download - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/phrozen-keylogger-lite-v10-download.html 
🔥🔥
 
Published: 2013 03 10 06:27:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Biggest password cracking wordlist with millions of words - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/biggest-password-cracking-wordlist-with.html 
🔥🔥
 
Published: 2013 03 10 17:01:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: The Social-Engineer Toolkit (SET) v4.7 released - published about 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/the-social-engineer-toolkit-set-v47.html 
🔥🔥
 
Published: 2013 03 15 18:10:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
09:05 Wifi Honey - Creates fake APs using all encryption
🔥🔥
09:05 Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device
🔥🔥
09:05 BeEF 0.4.3.8 - Browser Exploitation Framework
🔥🔥
09:05 Joomscan updated - now can identify 673 joomla vulnerabilities
🔥🔥
09:05 ExploitShield Browser Edition - Forget about browser vulnerabilities
🔥🔥
09:05 PySQLi - Python SQL injection framework
🔥🔥
09:05 TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
🔥🔥
09:05 NetSleuth : Open source Network Forensics And Analysis Tools
🔥🔥
09:05 SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS
🔥🔥
09:05 PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
🔥🔥
09:05 PwnStar latest version with new Exploits released
🔥🔥
09:05 BlindElephant – Web Application Fingerprinting
🔥🔥
09:05 Automated HTTP Enumeration Tool
🔥🔥
09:05 Weevely : Stealth PHP web shell with telnet style console
🔥🔥
09:05 Password Cracker Tool Hashkill version 0.3.1 released
🔥🔥
09:05 WAppEx v2.0 : Web Application exploitation Tool
🔥🔥
09:05 Unhide Forensic Tool, Find hidden processes and ports
🔥🔥
09:05 Recon-ng : Web Reconnaisance framework for Penetration testers
🔥🔥
09:05 Snort 2.9.4.1 - Network intrusion detection system
🔥🔥
09:05 Pentoo 2013.0 RC1.1 Released
🔥🔥
09:05 Phrozen Keylogger Lite v1.0 download
🔥🔥
09:05 Biggest password cracking wordlist with millions of words
🔥🔥
09:05 The Social-Engineer Toolkit (SET) v4.7 released
🔥🔥

Topic: Security Tooling

Articles recieved 06/06/2021
Article: FireStorePwn - Firestore Database Vulnerability Scanner Using APKs - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/firestorepwn-firestore-database.html 
🔥🔥
 
Published: 2021 05 27 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Dystopia - Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/dystopia-low-to-medium-multithreaded.html 
🔥🔥
 
Published: 2021 05 27 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: AnalyticsRelationships - Get Related Domains / Subdomains By Looking At Google Analytics IDs - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/analyticsrelationships-get-related.html 
🔥🔥
 
Published: 2021 05 28 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: HookDump - Security Product Hook Detection - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/hookdump-security-product-hook-detection.html 
🔥🔥
 
Published: 2021 05 28 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: slopShell - The Only Php Webshell You Need - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/slopshell-only-php-webshell-you-need.html 
🔥🔥
 
Published: 2021 05 29 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: IMAPLoginTester - Script That Reads A Text File With Lots Of E-Mails And Passwords, And Tries To Check If Those Credentials Are Valid By Trying To Login On IMAP Servers - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/imaplogintester-script-that-reads-text.html 
🔥🔥
 
Published: 2021 05 29 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: CheeseTools - Self-developed Tools For Lateral Movement/Code Execution - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/cheesetools-self-developed-tools-for.html 
🔥🔥
 
Published: 2021 05 30 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Kaiju - A Binary Analysis Framework Extension For The Ghidra Software Reverse Engineering Suite - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/kaiju-binary-analysis-framework.html 
🔥🔥
 
Published: 2021 05 30 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Bucky - An Automatic S3 Bucket Discovery Tool - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/bucky-automatic-s3-bucket-discovery-tool.html 
🔥🔥
 
Published: 2021 05 31 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: magicRecon - A Powerful Shell Script To Maximize The Recon And Data Collection Process Of An Objective And Finding Common Vulnerabilities - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/05/magicrecon-powerful-shell-script-to.html 
🔥🔥
 
Published: 2021 05 31 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Dent - A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft's WDAPT Sensors - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/dent-framework-for-creating-com-based.html 
🔥🔥
 
Published: 2021 06 01 22:18:24
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Arkhota - A Web Brute Forcer For Android - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/arkhota-web-brute-forcer-for-android.html 
🔥🔥
 
Published: 2021 06 02 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Onelinepy - Python Obfuscator To Generate One-Liners And FUD Payloads - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/onelinepy-python-obfuscator-to-generate.html 
🔥🔥
 
Published: 2021 06 02 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: 403Fuzzer - Fuzz 403/401Ing Endpoints For Bypasses - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/403fuzzer-fuzz-403401ing-endpoints-for.html 
🔥🔥
 
Published: 2021 06 03 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Bn-Uefi-Helper - Helper Plugin For Analyzing UEFI Firmware - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/bn-uefi-helper-helper-plugin-for.html 
🔥🔥
 
Published: 2021 06 03 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Penglab - Abuse Of Google Colab For Cracking Hashes - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/penglab-abuse-of-google-colab-for.html 
🔥🔥
 
Published: 2021 06 04 12:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Metarget - Framework Providing Automatic Constructions Of Vulnerable Infrastructures - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/metarget-framework-providing-automatic.html 
🔥🔥
 
Published: 2021 06 04 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
Article: Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS - published almost 3 years ago.
Content:
http://www.kitploit.com/2021/06/shepard-in-progress-persistent.html 
🔥🔥
 
Published: 2021 06 05 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
09:05 FireStorePwn - Firestore Database Vulnerability Scanner Using APKs
🔥🔥
09:05 Dystopia - Low To Medium Multithreaded Ubuntu Core Honeypot Coded In Python
🔥🔥
09:05 AnalyticsRelationships - Get Related Domains / Subdomains By Looking At Google Analytics IDs
🔥🔥
09:05 HookDump - Security Product Hook Detection
🔥🔥
09:05 slopShell - The Only Php Webshell You Need
🔥🔥
09:05 IMAPLoginTester - Script That Reads A Text File With Lots Of E-Mails And Passwords, And Tries To Check If Those Credentials Are Valid By Trying To Login On IMAP Servers
🔥🔥
09:05 CheeseTools - Self-developed Tools For Lateral Movement/Code Execution
🔥🔥
09:05 Kaiju - A Binary Analysis Framework Extension For The Ghidra Software Reverse Engineering Suite
🔥🔥
09:05 Bucky - An Automatic S3 Bucket Discovery Tool
🔥🔥
09:05 magicRecon - A Powerful Shell Script To Maximize The Recon And Data Collection Process Of An Objective And Finding Common Vulnerabilities
🔥🔥
09:05 Dent - A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft's WDAPT Sensors
🔥🔥
09:05 Arkhota - A Web Brute Forcer For Android
🔥🔥
09:05 Onelinepy - Python Obfuscator To Generate One-Liners And FUD Payloads
🔥🔥
09:05 403Fuzzer - Fuzz 403/401Ing Endpoints For Bypasses
🔥🔥
09:05 Bn-Uefi-Helper - Helper Plugin For Analyzing UEFI Firmware
🔥🔥
09:05 Penglab - Abuse Of Google Colab For Cracking Hashes
🔥🔥
09:05 Metarget - Framework Providing Automatic Constructions Of Vulnerable Infrastructures
🔥🔥
09:05 Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 2,120
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor