Blog

Latest news around the world

19

Mar'20

XSpear - Powerfull XSS Scanning and Parameter analysis tool and gem

Xspear is a powerful XSS scanning and parameter analysis tool on ruby gems, capable of both static and dynamic XSS …

Read More

17

Mar'20

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.

Magic Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on …

Read More

16

Mar'20

Zelos - A comprehensive binary emulation platform

Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess the dynamic behavior of …

Read More

16

Mar'20

IceBox - Virtual Machine Introspection, Tracing & Debugging

Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). …

Read More

13

Mar'20

Splunk Attack Range

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the …

Read More

13

Mar'20

PTF - Pentest Tools Framework (exploits, Scanner, Password.)

PTF - Pentest Tools Framework is a database of exploits, scanners and tools for penetration testing. PTF is a powerful …

Read More

12

Mar'20

Sifter - an OSINT, recon and vulnerability scanner

Sifter is an OSINT, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order …

Read More

12

Mar'20

TheFatRat - A Massive Exploiting Tool

TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed …

Read More

12

Mar'20

Why Use a Third-Party Threat Intel Platform to Enhance Cyber Defense by Jonathan Zhang

With the continued rise of new threats daily, a purely reactive approach to cybersecurity can land businesses in the latest …

Read More

11

Mar'20

Capture credentials with Wireshark [FREE COURSE CONTENT]

In this video from our ARP Poisoning course we take a look at how we can use Wireshark to capture …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013