Blog

Latest news around the world

30

Nov'19

TESLA PowerWall 2 Security Shenanigans

The Tesla Powerwall 2 (PW) is a battery storage solution. It is often installed in combination with photovoltaic solar panels …

Read More

29

Nov'19

navi - An interactive cheatsheet tool for the command-line

navi allows you to browse through cheatsheets (that you may write yourself or download from maintainers) and execute commands, with …

Read More

29

Nov'19

Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit

AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that …

Read More

28

Nov'19

RdpThief - Extracting Clear Text Passwords from mstsc.exe using API Hooking

RdpThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the …

Read More

27

Nov'19

Sshtunnel - SSH Tunnels To Remote Server

Author: Pahaz Repo: https://github.com/pahaz/sshtunnel/ Inspired by https://github.com/jmagnusson/bgtunnel, which doesn't work on Windows. See also: https://github.com/paramiko/paramiko/blob/master/demos/forward.py Requirements paramiko Installation sshtunnel is …

Read More

26

Nov'19

Glances - A top/htop alternative for GNU/Linux, BSD, MacOS and Windows

Glances is a cross-platform monitoring tool which aims to present a large amount of monitoring information through a curses or …

Read More

25

Nov'19

Ultimate Facebook Scraper (UFS)

Tooling that automates your social media interactions to collect posts, photos, videos, friends, followers and much more on Facebook. A bot …

Read More

22

Nov'19

Leading Methodologies Used by a Penetration Tester by Claire Mackerras

Did you know that the figures of cyber-attacks have increased extensively from the last decade? Along with this, Advanced Persistent …

Read More

21

Nov'19

Domain Intelligence for Proactive Threat Defense by Jonathan Zhang

According to the World Intellectual Property Organization (WIPO), the volume of cybersquatting cases grew by as much as 12% in …

Read More

20

Nov'19

SQL Injection attacks - using information schema to retrieve data [FREE COURSE CONTENT]

In this video from our  Secure Coding with PHP online course our instructor Munir will show you how badly coded …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013