Blog

Latest news around the world

28

Sep'20

PwnedPasswordsChecker - Search (Offline) If Your Password (NTLM Or SHA1 Format) Has Been Leaked

PwnedPasswordsChecker is a tool that checks if the hash of a known password (in SHA1 or NTLM format) is present in …

Read More

28

Sep'20

Wacker - A WPA3 Dictionary Cracker

A set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant …

Read More

25

Sep'20

VMPDump - A dynamic VMP dumper and import fixer, powered by VTIL.

A dynamic VMP dumper and import fixer, powered by VTIL. Works for VMProtect 3.X x64. Before vs After Usage VMPDump.exe <Target …

Read More

24

Sep'20

Winshark - Wireshark plugin to work with Event Tracing for Windows

Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were …

Read More

24

Sep'20

List of Free Python Resources [Updated September 2020]

Python is considered as a beginner-friendly programming language and its community provides many free resources for beginners and more advanced …

Read More

23

Sep'20

GRAT2 - Command and Control (C2) tool written in python3 and the client in .NET 4.0.

GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.0. The main idea …

Read More

22

Sep'20

Moriarty Project - This tool gives information about the phone number that you entered

What IS Moriarty? Advanced Information Gathering And Osint Tool Moriarty is a tool that tries to find good information about …

Read More

21

Sep'20

Ranked: The European countries most at risk of RDP Brute-Force attacks

The number of people working from home has risen astronomically this year due to Covid-19. Consequently, numerous companies have been …

Read More

21

Sep'20

CRLFuzz - A fast tool to scan CRLF vulnerability written in Go

Installation from Binary The installation is easy. You can download a prebuilt binary from the releases page, unpack and run! …

Read More

17

Sep'20

Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From Outside Using Impacket

This repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows Active Directory Domain. The difference …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013