Blog

Latest news around the world

09

Aug'22

Evil-WinRM: The ultimate WinRM shell for hacking/pentesting

Description & Purpose This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation …

Read More

09

Aug'22

OpenCTI - Open Cyber Threat Intelligence Platform

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been …

Read More

08

Aug'22

BlackStone Project - Pentesting Reporting Tool

BlackStone project or "BlackStone Project" is a tool created in order to automate the work of drafting and submitting a …

Read More

04

Aug'22

Importance of Risk Management Techniques in Ethical Hacking by Akhila Nasneem

Modern technology uses the term “hacking” to describe expert programmers breaking into the computers of targeted organizations or individuals. The …

Read More

01

Aug'22

AllHackingTools - a system designed to automate the download process and install various tools for penetration testing.

• License • Issues • Project • Wikipedia • AllHackingTools: is a system designed to automate the download process and …

Read More

28

Jul'22

Uncovering Data From Phone Numbers by Gergo Varga

Before Googling movie trivia to prove friends and loved ones wrong, before Facebook stalking, before the internet was even available …

Read More

18

Jul'22

How To Protect Your Affiliate Website From Security Threat

If you have an affiliate website, you know that it can be a significant source of revenue. But you may …

Read More

12

Jul'22

Blackbird - An OSINT tool to search for accounts by username in social networks

The Lockheed SR-71 "Blackbird" is a long-range, high-altitude, Mach 3+ strategic reconnaissance aircraft developed and manufactured by the American aerospace …

Read More

12

Jul'22

Casper-fs is a Custom Hidden Linux Kernel Module Generator

Casper-fs is a custom Linux Kernel Module generator to work with resources to protect or hide a custom list of …

Read More

11

Jul'22

IPS vs. IDS: 5 Differences and How to Choose by Gilad David Maayan

What Is IDS (Intrusion Detection System) and How Does It Work? An intrusion detection system (IDS) is a network security …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
GET A FREE EDITION!
Join our newsletter and receive for FREE, our premium edition “Brute Force and Supply Chain Attacks”
x