Blog

Latest news around the world

26

Jun'20

TBomb An open-source SMS/call bomber for Linux And Termux.

Due to misusing of TBomb, several API's died. Don't be afraid if you don't see all send messages. The script …

Read More

25

Jun'20

Raccoon - Offensive Security Tool for Reconnaissance and Information Gathering

Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from fetching …

Read More

25

Jun'20

Striker - Recon & Vulnerability Scanning Suite

Striker 2.0 is still in the prototype phase, which means it's not intended to be used by regular users. It …

Read More

23

Jun'20

Osmedeus - Fully automated offensive security framework for reconnaissance and vulnerability scanning

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git …

Read More

22

Jun'20

O.G. AUTO-RECON: Enumerate a target Based off of Nmap Results

The purpose of O.G. Auto-Recon is to automate the initial information-gathering phase and then enumerate based on those results as …

Read More

22

Jun'20

Securing Your SAP Implementation by Gilad David Maayan

SAP systems are used by many organizations to store and process significant amounts of confidential or sensitive data. This data …

Read More

19

Jun'20

MARA is a Mobile Application Reverse engineering and Analysis Framework.

MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile …

Read More

18

Jun'20

Bandit is a tool designed to find common security issues in Python code

Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, …

Read More

18

Jun'20

BlackDir-Framework: Web Application Vulnerability Scanner

1 Spider Directories 2 Find Sub Domain 3 Advanced Dorks Search 4 Scan list of Dorks 5 Scan WebSites Xss,Sql,Html …

Read More

17

Jun'20

Buffer Overflow Shellcode [FREE COURSE CONTENT]

In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi,  we'll …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013