Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 2,303

Topic: Security Tooling

Articles recieved 06/06/2021
Article: UPDATE: FudgeC2 0.5.7 - published over 4 years ago.
Content: FudgeC2 0.5.7 was released in June and this post documents the changes made to it. As you may remember, this awesome adversary emulation system was listed in my older post titled – List of Open Source C2 Post-Exploitation Frameworks. The new version brings system SMTP support, operations security (OPSEC) improvements, introduces new RESTful endpoints and UI ...
https://pentestit.com/fudgec2-0-5-7-released/ 
🔥🔥
 
Published: 2020 08 13 19:03:38
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
Article: UPDATE: Kali Linux 2020.3 Release - published about 4 years ago.
Content: Kali Linux 2020.3 was released a couple of days ago and this post makes an attempt at understanding the changes in this release. Briefly, the latest version of Kali Linux includes the release Win-Kex, better HiDPI support, standard tool and kernel updates. These are the list of changes since Kali Linux 2020.2 release: New Shell (Upcoming) – By default, Kali ...
https://pentestit.com/kali-linux-2020-3-release-available/ 
🔥🔥
 
Published: 2020 08 27 17:06:12
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
Article: UPDATE: Merlin v0.9.0 - published about 4 years ago.
Content: Merlin v0.9.0 was released a couple of days ago. This release adds support for HTTP and h2c protocols. As we know, the h2c protocol is the non-TLS version of HTTP/2. This release also adds new “Listeners” menu to create and manage multiple listeners. You can now configure agent/listeners to listen on a list of resources and change the Agent JA3 hash on the f...
https://pentestit.com/merlin-v0-9-0-released/ 
🔥🔥
 
Published: 2020 09 16 00:37:04
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
Article: UPDATE: Empire v3.4.0 - published about 4 years ago.
Content: Empire v3.4.0 was released a couple of days ago! I briefly mentioned about this tool in my old post titled – List of Open Source C2 Post-Exploitation Frameworks. This new version brings support for Malleable C2 listeners and reflective file loading among other bug fixes. What is Empire? Empire 3.x is an open source post-exploitation framework that includes a...
https://pentestit.com/empire-v3-4-0-post-exploitation-framework-updated/ 
🔥🔥
 
Published: 2020 09 18 18:30:07
Received: 2021 06 06 09:05:31
Feed: PenTestIT
Source: PenTestIT
Category: News
Topic: Security Tooling
09:05 UPDATE: FudgeC2 0.5.7
🔥🔥
09:05 UPDATE: Kali Linux 2020.3 Release
🔥🔥
09:05 UPDATE: Merlin v0.9.0
🔥🔥
09:05 UPDATE: Empire v3.4.0
🔥🔥

Topic: Security Tooling

Articles recieved 06/06/2021
Article: Episode #159: Portalogical Exam - published about 13 years ago.
Content: Tim finally has an ideaSadly, we've been away for two weeks due to lack of new, original ideas for posts. BUT! I came up with and idea. Yep, all by myself too. (By the way, if you have an idea for an episode send it in)During my day job pen testing, I regularly look at nmap results to see what services are available. I like to get a high level look at the op...
http://blog.commandlinekungfu.com/2011/10/episode-159-portalogical-exam.html 
🔥🔥
 
Published: 2011 10 04 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #160: Plotting to Take Over the World - published about 13 years ago.
Content: Hal's been teachingWhew! Just got done with another week of teaching, this time at SANS Baltimore. I even got a chance to give my "Return of Command Line Kung Fu" talk, so I got a bunch of shell questions.One of my students had a very interesting challenge. To help analyze malicious PDF documents, he was trying to parse the output of Didier Stevens' pdf-p...
http://blog.commandlinekungfu.com/2011/10/episode-160-plotting-to-take-over-world.html 
🔥🔥
 
Published: 2011 10 18 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #161: Cleaning up the Joint - published about 13 years ago.
Content: Hal's got emailApparently tired of emailing me after we post an Episode, Davide Brini decided to write us with a challenge based on a problem he had to solve recently. Davide had a directory full of software tarballs with names like:package-foo-10006.tar.gzpackage-foo-10009.tar.gzpackage-foo-8899.tar.gzpackage-foo-9998.tar.gzpackage-bar-3235.tar.gzpackage-b...
http://blog.commandlinekungfu.com/2011/11/episode-161-cleaning-up-joint.html 
🔥🔥
 
Published: 2011 11 08 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #162: Et Tu Bruteforce - published about 13 years ago.
Content: Tim is looking for a way inA few weeks ago I got a call from a Mr 53, of LaNMaSteR53 fame from the pauldotcom blog. Mister, Tim "I have a very cool first name" Tomes was working on a way to brute force passwords. The scenario is hundreds (or more) accounts were created all (presumably) using the same initial password. He noticed all the accounts were created...
http://blog.commandlinekungfu.com/2011/11/episode-162-et-tu-bruteforce.html 
🔥🔥
 
Published: 2011 11 15 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #163: Pilgrim's Progress - published almost 13 years ago.
Content: Tim checks the metamail:I hope everyone had a good Thanksgiving. I know I did, and I sure have a lot to be thankful for.Today we receive mail about mail. Ed writes in about Rob VandenBrink writing in:Gents,Rob VandenBrink sent me a cool idea this morning. It's for printing out a text-based progress indicator in cmd.exe. The idea is that if you have a loop ...
http://blog.commandlinekungfu.com/2011/11/episode-163-pilgrims-progress.html 
🔥🔥
 
Published: 2011 11 29 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #164: Exfiltration Nation - published almost 13 years ago.
Content: Hal pillages the mailboxHappy 2012 everybody!In the days and weeks to come, the industry press will no doubt be filled with stories of all the high-profile companies whose data was "liberated" during the past couple of weeks. It may be a holiday for most of us, but it's the perfect time for the black hats to be putting in a little overtime with their data e...
http://blog.commandlinekungfu.com/2012/01/episode-164-exfiltration-nation.html 
🔥🔥
 
Published: 2012 01 10 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #165: What's the Frequency Kenneth? - published almost 13 years ago.
Content: Tim helps Tim crack the codeLong time reader, second time caller emailer writes in:I've always been interested in mystery and codes (going back to 'Mystery Club' in 7th Grade), and today I discovered a cool show on History Channel called Decoded. They were talking about cryptography, specifically frequency analysis. I'm not an educator here but just to make ...
http://blog.commandlinekungfu.com/2012/01/episode-165-whats-frequency-kenneth.html 
🔥🔥
 
Published: 2012 01 24 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: AWK-ward! - published almost 12 years ago.
Content: Yesterday I got an email friend who complained that "awk is still a mystery". Not being one to ignore a cry for help with the command line, I was motivated to write up a simple introduction to the basics of awk. But where to post it? I know! We've got this little blog we're not doing anything with at the moment (er, yeah, sorry about that folks-- life's ...
http://blog.commandlinekungfu.com/2012/12/awk-ward.html 
🔥🔥
 
Published: 2012 12 20 05:01:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: An AWK-ward Response - published almost 12 years ago.
Content: A couple of weeks ago I promised some answers to the exercises I proposed at the end of my last post. What we have here is a case of, "Better late than never!" 1. If you go back and look at the example where I counted the number of processes per user, you'll notice that the "UID" header from the ps command ends up being counted. How would you suppress this?...
http://blog.commandlinekungfu.com/2013/01/an-awk-ward-response.html 
🔥🔥
 
Published: 2013 01 07 00:29:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #166: Ping A Little Log For Me - published over 11 years ago.
Content: We've been away for a while because, frankly, we ran out of material. In the meantime we tried to come up with some new ideas and there have had a few requests, but sadly they were all redundant, became scripts, or both. We've been looking long and hard for Fu that works in this format, and we've finally found it! Nathan Sweaney wrote in with a great idea! I...
http://blog.commandlinekungfu.com/2013/03/episode-166-ping-little-log-for-me.html 
🔥🔥
 
Published: 2013 03 12 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #167: Big MAC - published over 11 years ago.
Content: Hal checks into Twitter: So there I was, browsing my Twitter timeline and a friend forwarded a link to Jeremy Ashkenas' github site. Jeremy created an alias for changing your MAC address to a random value. This is useful when you're on a public WiFi network that only gives you a small amount of free minutes. Since most of these services keep track by noti...
http://blog.commandlinekungfu.com/2013/06/episode-167-big-mac.html 
🔥🔥
 
Published: 2013 06 18 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #168: Scan On, You Crazy Command Line - published over 11 years ago.
Content: Hal gets back to our roots With one ear carefully tuned to cries of desperation from the Internet, it's no wonder I picked up on this plea from David Nides on Twitter: Request today, we need 2 scan XX terabytes of data across 3k file shares 4any files that have not been MAC since 2012. Then move files to x.— David Nides (@DAVNADS) March 13, 2013 Whenever I s...
http://blog.commandlinekungfu.com/2013/07/episode-168-scan-on-you-crazy-command.html 
🔥🔥
 
Published: 2013 07 02 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #169: Move Me Maybe - published over 11 years ago.
Content: Tim checks the mailbag Carlos IHaveNoLastName writes in asking for a way to move a directory to a new destination. That's easy, but the directory should only be moved if the the directory (at any depth) does NOT contain a file with a specific extenstion. Here is an example of a sample directory structure: SomeTopDir1|-OtherDir1| |-File1| |-File2| |-File2|...
http://blog.commandlinekungfu.com/2013/08/episode-169-move-me-maybe.html 
🔥🔥
 
Published: 2013 08 06 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #170: Fearless Forensic File Fu - published about 11 years ago.
Content: Hal receives a cry for help Fellow forensicator Craig was in a bit of a quandary. He had a forensic image in "split raw" format-- a complete forensic image broken up into small pieces. Unfortunately for him, the pieces were named "fileaa", "fileab", "fileac", and so on while his preferred tool wanted the files to be named "file.001", "file.002", "file.003"...
http://blog.commandlinekungfu.com/2013/09/episode-170-fearless-forensic-file-fu.html 
🔥🔥
 
Published: 2013 09 27 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #171: Flexibly Finding Firewall Phrases - published about 11 years ago.
Content: Old Tim answers an old email Patrick Hoerter writes in:I have a large firewall configuration file that I am working with. It comes from that vendor that likes to prepend each product they sell with the same "well defended" name. Each configuration item inside it is multiple lines starting with "edit" and ending with "next". I'm trying to extract only the ...
http://blog.commandlinekungfu.com/2013/10/episode-171-flexibly-finding-firewall.html 
🔥🔥
 
Published: 2013 10 08 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #172: Who said bigger is better? - published almost 11 years ago.
Content: Tim sweats the small stuff Ted S. writes in: "I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &c), r...
http://blog.commandlinekungfu.com/2013/11/episode-172-who-said-bigger-is-better.html 
🔥🔥
 
Published: 2013 11 26 09:18:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #173: Tis the Season - published almost 11 years ago.
Content: Hal finds some cheer From somewhere near the borders of scriptistan, we send you:function t { for ((i=0; $i < $1; i++)); do s=$((8-$i)); e=$((8+$i)); for ((j=0; j <= $e; j++)); do [ $j -ge $s ] && echo -n '^' || echo -n ' '; done; echo; done}function T { for ((i=0; $i < $1; i++)); do for ((j=0; j < 10...
http://blog.commandlinekungfu.com/2013/12/episode-173-tis-season.html 
🔥🔥
 
Published: 2013 12 31 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #174: Lightning Lockdown - published almost 11 years ago.
Content: Hal firewalls fast Recently a client needed me to quickly set up an IP Tables firewall on a production server that was effectively open on the Internet. I knew very little about the machine, and we couldn't afford to break any of the production traffic to and from the box. It occurred to me that a decent first approximation would be to simply look at the net...
http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html 
🔥🔥
 
Published: 2014 01 28 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #175: More Time! We Need More Time! - published over 10 years ago.
Content: Tim leaps in Every four years (or so) we get an extra day in February, leap year. When I was a kid this term confused me. Frogs leap, they leap over things. A leap year should be shorter! Obviously, I was wrong. This extra day can give us extra time to complete tasks (e.g. write blog post), so we are going to use our shells to check if the current year is a ...
http://blog.commandlinekungfu.com/2014/02/episode-175-more-time-we-need-more-time.html 
🔥🔥
 
Published: 2014 02 28 10:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #176: Step Up to the WMIC - published over 10 years ago.
Content: Tim grabs the mic: Michael Behan writes in: Perhaps you guys can make this one better. Haven’t put a ton of thought into it: C:\> (echo HTTP/1.0 200 OK & wmic process list full /format:htable) | nc -l -p 3000 Then visit http://127.0.0.1:3000 This could of course be used to generate a lot more HTML reports via wmic that are quick to save from the brows...
http://blog.commandlinekungfu.com/2014/03/episode-176-step-up-to-wmic.html 
🔥🔥
 
Published: 2014 03 31 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #177: There and Back Again - published over 10 years ago.
Content: Hal finds some old mail Way, way back after Episode #170 Tony Reusser sent us a follow-up query. If you recall, Episode #170 showed how to change files named "fileaa", "fileab", "fileac", etc to files named "file.001", "file.002", "file.003". Tony's question was how to go back the other way-- from "file.001" to "fileaa", "file.002" to "fileab", and so on. ...
http://blog.commandlinekungfu.com/2014/04/episode-177-there-and-back-again.html 
🔥🔥
 
Published: 2014 05 01 01:01:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #178: Luhn-acy - published over 10 years ago.
Content: Hal limbers up in the dojo To maintain our fighting trim here in the Command Line Kung Fu dojo, we like to set little challenges for ourselves from time to time. Of course, we prefer it when our loyal readers send us ideas, so keep those emails coming! Really... please oh please oh please keep those emails coming... please, please, please... ahem, but I di...
http://blog.commandlinekungfu.com/2014/05/not-ready-yet-episode-178-luhn-acy.html 
🔥🔥
 
Published: 2014 05 26 09:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #179: The Check is in the Mail - published over 10 years ago.
Content: Tim mails one in: Bob Meckle writes in: I have recently come across a situation where it would be greatly beneficial to build a script to check revocation dates on certificates issued using a certain template, and send an email to our certificate staff letting them know which certificates will expire within the next 6 weeks. I am wondering if you guys have ...
http://blog.commandlinekungfu.com/2014/06/episode-179-check-is-in-mail.html 
🔥🔥
 
Published: 2014 06 30 21:51:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #180: Open for the Holidays! - published almost 10 years ago.
Content: Not-so-Tiny Tim checks in with the ghost of Christmas present: I know many of you have been sitting on Santa's lap wishing for more Command Line Kung Fu. Well, we've heard your pleas and are pushing one last Episode out before the New Year! We come bearing a solution for a problem we've all encountered. Ever try to delete or modify a file and receive an err...
http://blog.commandlinekungfu.com/2014/12/episode-180-open-for-holidays.html 
🔥🔥
 
Published: 2014 12 31 12:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #181: Making Contact - published about 7 years ago.
Content: Hal wanders back on stage Whew! Sure is dusty in here!Man, those were the days! It started with Ed jamming on Twitter and me heckling from the audience. Then Ed invited me up on stage (once we built the stage), and that was some pretty sweet kung fu. Then Tim joined the band, Ed left, and the miles, and the booze, and the groupies got to be too much.But we s...
http://blog.commandlinekungfu.com/2017/10/episode-181-making-contact.html 
🔥🔥
 
Published: 2017 10 03 13:00:00
Received: 2021 06 06 09:05:29
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
09:05 Episode #159: Portalogical Exam
🔥🔥
09:05 Episode #160: Plotting to Take Over the World
🔥🔥
09:05 Episode #161: Cleaning up the Joint
🔥🔥
09:05 Episode #162: Et Tu Bruteforce
🔥🔥
09:05 Episode #163: Pilgrim's Progress
🔥🔥
09:05 Episode #164: Exfiltration Nation
🔥🔥
09:05 Episode #165: What's the Frequency Kenneth?
🔥🔥
09:05 AWK-ward!
🔥🔥
09:05 An AWK-ward Response
🔥🔥
09:05 Episode #166: Ping A Little Log For Me
🔥🔥
09:05 Episode #167: Big MAC
🔥🔥
09:05 Episode #168: Scan On, You Crazy Command Line
🔥🔥
09:05 Episode #169: Move Me Maybe
🔥🔥
09:05 Episode #170: Fearless Forensic File Fu
🔥🔥
09:05 Episode #171: Flexibly Finding Firewall Phrases
🔥🔥
09:05 Episode #172: Who said bigger is better?
🔥🔥
09:05 Episode #173: Tis the Season
🔥🔥
09:05 Episode #174: Lightning Lockdown
🔥🔥
09:05 Episode #175: More Time! We Need More Time!
🔥🔥
09:05 Episode #176: Step Up to the WMIC
🔥🔥
09:05 Episode #177: There and Back Again
🔥🔥
09:05 Episode #178: Luhn-acy
🔥🔥
09:05 Episode #179: The Check is in the Mail
🔥🔥
09:05 Episode #180: Open for the Holidays!
🔥🔥
09:05 Episode #181: Making Contact
🔥🔥

Topic: Security Tooling

Articles recieved 06/06/2021
Article: Wifi Honey - Creates fake APs using all encryption - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/wifi-honey-creates-fake-aps-using-all.html 
🔥🔥
 
Published: 2012 11 03 21:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/spooftooph-052-automated-spoofing-or.html 
🔥🔥
 
Published: 2012 11 03 21:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BeEF 0.4.3.8 - Browser Exploitation Framework - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/beef-0438-browser-exploitation-framework.html 
🔥🔥
 
Published: 2012 11 03 21:37:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Joomscan updated - now can identify 673 joomla vulnerabilities - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/joomscan-updated-now-can-identify-673.html 
🔥🔥
 
Published: 2012 11 03 21:45:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: ExploitShield Browser Edition - Forget about browser vulnerabilities - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/exploitshield-browser-edition-forget.html 
🔥🔥
 
Published: 2012 11 04 12:32:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PySQLi - Python SQL injection framework - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pysqli-python-sql-injection-framework.html 
🔥🔥
 
Published: 2012 11 04 18:03:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: TXDNS v 2.2.1 - Aggressive multithreaded DNS digger - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/txdns-v-221-aggressive-multithreaded.html 
🔥🔥
 
Published: 2012 11 10 15:13:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: NetSleuth : Open source Network Forensics And Analysis Tools - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/netsleuth-open-source-network-forensics.html 
🔥🔥
 
Published: 2012 11 10 15:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/sslsplit-v-045-man-in-middle-attacks.html 
🔥🔥
 
Published: 2012 11 10 15:30:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnpi-v20-pen-test-drop-box-distro-for.html 
🔥🔥
 
Published: 2012 11 10 15:42:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: PwnStar latest version with new Exploits released - published about 12 years ago.
Content:
https://thntools999.blogspot.com/2012/11/pwnstar-latest-version-with-new.html 
🔥🔥
 
Published: 2012 11 10 15:53:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: BlindElephant – Web Application Fingerprinting - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/blindelephant-web-application.html 
🔥🔥
 
Published: 2013 02 15 14:47:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Automated HTTP Enumeration Tool - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/automated-http-enumeration-tool.html 
🔥🔥
 
Published: 2013 02 15 16:07:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Weevely : Stealth PHP web shell with telnet style console - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/weevely-stealth-php-web-shell-with.html 
🔥🔥
 
Published: 2013 02 15 16:48:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Password Cracker Tool Hashkill version 0.3.1 released - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/password-cracker-tool-hashkill-version.html 
🔥🔥
 
Published: 2013 02 15 17:02:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: WAppEx v2.0 : Web Application exploitation Tool - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/wappex-v20-web-application-exploitation.html 
🔥🔥
 
Published: 2013 02 15 17:15:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Unhide Forensic Tool, Find hidden processes and ports - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/unhide-forensic-tool-find-hidden.html 
🔥🔥
 
Published: 2013 02 15 17:39:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Recon-ng : Web Reconnaisance framework for Penetration testers - published almost 12 years ago.
Content:
https://thntools999.blogspot.com/2013/02/recon-ng-web-reconnaisance-framework.html 
🔥🔥
 
Published: 2013 02 17 17:12:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Snort 2.9.4.1 - Network intrusion detection system - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/snort-2941-network-intrusion-detection.html 
🔥🔥
 
Published: 2013 03 05 07:46:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Pentoo 2013.0 RC1.1 Released - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/pentoo-20130-rc11-released.html 
🔥🔥
 
Published: 2013 03 10 06:21:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Phrozen Keylogger Lite v1.0 download - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/phrozen-keylogger-lite-v10-download.html 
🔥🔥
 
Published: 2013 03 10 06:27:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: Biggest password cracking wordlist with millions of words - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/biggest-password-cracking-wordlist-with.html 
🔥🔥
 
Published: 2013 03 10 17:01:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
Article: The Social-Engineer Toolkit (SET) v4.7 released - published over 11 years ago.
Content:
https://thntools999.blogspot.com/2013/03/the-social-engineer-toolkit-set-v47.html 
🔥🔥
 
Published: 2013 03 15 18:10:00
Received: 2021 06 06 09:05:31
Feed: Penetration Testing and Security Tools Download
Source: Penetration Testing and Security Tools Download
Category: News
Topic: Security Tooling
09:05 Wifi Honey - Creates fake APs using all encryption
🔥🔥
09:05 Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device
🔥🔥
09:05 BeEF 0.4.3.8 - Browser Exploitation Framework
🔥🔥
09:05 Joomscan updated - now can identify 673 joomla vulnerabilities
🔥🔥
09:05 ExploitShield Browser Edition - Forget about browser vulnerabilities
🔥🔥
09:05 PySQLi - Python SQL injection framework
🔥🔥
09:05 TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
🔥🔥
09:05 NetSleuth : Open source Network Forensics And Analysis Tools
🔥🔥
09:05 SSLsplit v 0.4.5 - Man-in-the-middle attacks against SSL/TLS
🔥🔥
09:05 PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
🔥🔥
09:05 PwnStar latest version with new Exploits released
🔥🔥
09:05 BlindElephant – Web Application Fingerprinting
🔥🔥
09:05 Automated HTTP Enumeration Tool
🔥🔥
09:05 Weevely : Stealth PHP web shell with telnet style console
🔥🔥
09:05 Password Cracker Tool Hashkill version 0.3.1 released
🔥🔥
09:05 WAppEx v2.0 : Web Application exploitation Tool
🔥🔥
09:05 Unhide Forensic Tool, Find hidden processes and ports
🔥🔥
09:05 Recon-ng : Web Reconnaisance framework for Penetration testers
🔥🔥
09:05 Snort 2.9.4.1 - Network intrusion detection system
🔥🔥
09:05 Pentoo 2013.0 RC1.1 Released
🔥🔥
09:05 Phrozen Keylogger Lite v1.0 download
🔥🔥
09:05 Biggest password cracking wordlist with millions of words
🔥🔥
09:05 The Social-Engineer Toolkit (SET) v4.7 released
🔥🔥

Topic: Security Tooling

Articles recieved 06/06/2021
Article: Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS - published over 3 years ago.
Content:
http://www.kitploit.com/2021/06/shepard-in-progress-persistent.html 
🔥🔥
 
Published: 2021 06 05 21:30:00
Received: 2021 06 06 09:05:31
Feed: PenTest and Hacking Tools - powered by FeedBurner
Source: PenTest and Hacking Tools - powered by FeedBurner
Category: News
Topic: Security Tooling
09:05 Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 2,303
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor