Blog

Latest news around the world

27

Mar'20

Ninja - Open source C2 server created for stealth red team operations

Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration …

Read More

26

Mar'20

Katana- A Python Tool For Google Hacking

Katana-ds (ds for dork_scanner) is a simple python tool that automates Google Hacking/Dorking and supports TOR. It becomes a more powerful …

Read More

25

Mar'20

2FA Bypass With PowerShell [FREE COURSE CONTENT]

In this video from our PowerShell for Hackers course your instructor, Atul Tiwari, shows how to perform a 2FA bypass …

Read More

24

Mar'20

XXExploiter - Tool to help exploit XXE vulnerabilities

XXExploiter generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration. …

Read More

24

Mar'20

Starkiller is a Frontend for PowerShell Empire.

Starkiller is a Frontend for Powershell Empire. It is an Electron application written in VueJS. If you'd like to contribute …

Read More

23

Mar'20

Maryam : Open-source Intelligence(OSINT) Framework

OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular/tool framework based on the Recon-ng and written in Python. If …

Read More

23

Mar'20

uDork - Google Hacking Tool

uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or …

Read More

20

Mar'20

Tool-X is a Kali Linux hacking tools installer for Termux and linux system

Tool-X was developed for Termux and other android terminals. Using Tool-X, you can install almost 370+ hacking tools in Termux …

Read More

20

Mar'20

AutoSploit - Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through …

Read More

19

Mar'20

Repository of sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework

Sentinel ATT&CK aims to simplify the rapid deployment of a threat hunting capability that leverages Sysmon and MITRE ATT&CK on …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013