All posts by Marta Sienicka

19

Jan'22

Social Analyzer - API, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites

Social Analyzer - API, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ …

Read More

18

Jan'22

Hacking Your Way to Security - Learn How to Secure Better by Aqib Ijaz

Hacking and cybersecurity don’t belong in a single sentence, yet the best approach to securing any app, website or cyber …

Read More

13

Jan'22

Phantom - A multi-platform HTTP(S) Reverse Shell Server and Client

Phantom is a multi-platform HTTP(S) Reverse Shell server and client in Python 3. Binaries for Linux and Windows platforms can …

Read More

13

Jan'22

AlphaGolang - IDApython Scripts for Analyzing Golang Binaries

AlphaGolang is a collection of IDAPython scripts to help malware reverse engineers master Go binaries. The idea is to break …

Read More

13

Jan'22

ProtOSINT - Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses

ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses. Questions? Problems? Visit main page: …

Read More

12

Jan'22

Hack Yourself To A Secure Future With Breach And Attack Simulation by Jeff Broth

As the title denotes, you need to hack your organization's IT systems before cyberattackers do so. It is the best …

Read More

10

Dec'21

Cross-Browser Fingerprinting: Tracking and Verification Method of the Future or Abandoned Experiment?

At the NDSS Symposium of 2017, three researchers from Pennsylvania’s Lehigh University presented a paper on “(Cross-)Browser Fingerprinting via OS …

Read More

10

Dec'21

Privilege Escalation with MySQL User Defined Functions by Nairuz Abulhul

Functions are a block of queries and statements that take inputs and return values. All popular database systems provide a …

Read More

10

Dec'21

Kubernetes DDoS: Dangers of K8s Auto Scaling by Gilad David Maayan

Distributed denial of service (DDoS) is an old attack pattern, and there are well-known solutions for protecting against DDoS attacks. …

Read More

07

Dec'21

Building an Incident Response Process for SSRF Attacks by Gilad David Maayan

What is Server-Side Request Forgery (SSRF)? It is quite common for web applications to perform requests between HTTP servers, also …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013