All posts by Marta Sienicka

27

May'20

Voltron - an extensible debugger UI toolkit written in Python

Voltron is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers …

Read More

26

May'20

Ligolo: Reverse Tunneling made easy for pentesters, by pentesters

Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety …

Read More

25

May'20

Shotlooter - a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc

Shotlooter tool is developed to find sensitive data inside the screenshots which are uploaded to https://prnt.sc/ (via the LightShot software) …

Read More

22

May'20

Pi Sniffer is a Wi-Fi sniffer built on the Raspberry Pi Zero W

Pi Sniffer is a Wi-Fi sniffer built on the Raspberry Pi Zero W. While there are many excellent sniffing platforms …

Read More

21

May'20

Proxy.py – A lightweight, single file HTTP proxy server in python

To facilitate end-to-end testing for such scenarios, I architected a proxy infrastructure; A stripped-down version of which was a Proxy.py …

Read More

20

May'20

What You Need to Know About Network Security by Richard Azu

Photo by Pixabay from Pexels Is Your Network Immune from Attacks? Network security is the practice of implementing standards to protect network systems against …

Read More

20

May'20

GitHound - A batch-catching, pattern-matching, patch-attacking secret snatcher

GitHound pinpoints exposed API keys and other sensitive information across all of GitHub using pattern matching, commit history searching, and …

Read More

19

May'20

Identity and Access Management for “Dummies” by Richard Azu

Photo by Daria Shevtsova on Unsplash Is your system and network environment being managed effectively against exponentially increasing attacks? Do you have close …

Read More

19

May'20

Sharingan is a recon multitool for offensive security and bug bounty

Sharingan is a recon multitool for offensive security/bug bounty This is very much a work in progress and I'm relatively …

Read More

18

May'20

Kaiten - A Undetectable Payload Generation

An Undetectable Payload Generation. This tool is for educational purposes only, usage of Kaiten for attacking targets without prior mutual …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center

Necessary

Cookies that are necessary for the site to function properly. This includes, storing the user's cookie consent state for the current domain, managing users carts to using the content network, Cloudflare, to identify trusted web traffic. See full Cookies declaration

gdpr, PYPF, woocommerce_cart_hash, woocommerce_items_in_cart, _wp_wocommerce_session, __cfduid [x2]

Marketing


tr, fr
ads/ga-audiences