Blog

Latest news around the world

12

Jan'20

AWS Report - a tool for analyzing amazon resources

Features Search iam users based on creation date Search buckets public Search security group with inbound rule for 0.0.0.0/0 Search …

Read More

11

Jan'20

WAFW00F - The Web Application Firewall Fingerprinting Tool

How does it work? To do its magic, WAFW00F does the following: Sends a normal HTTP request and analyses the …

Read More

10

Jan'20

TuxResponse - Linux Incident Response

TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems …

Read More

08

Jan'20

Stowaway: Multi-hop proxy tool for security researchers and pentesters

Stowaway is Multi-hop proxy tool for security researchers and pentesters.¬†Users can easily proxy their network traffic to intranet nodes (multi-layer). …

Read More

07

Jan'20

Mapping-Injection: Just another Windows Process Injection

Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory. This can …

Read More

07

Jan'20

Hakrawler - A fast CLI web crawler for hackers

What is it? Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a …

Read More

06

Jan'20

How To Detect And Prevent Network Intrusion by Farwa Sajjad

A network intrusion is known as any vigorous or unauthorized activity that takes place on a digital network. All these …

Read More

03

Jan'20

Top 10 best hacking tools of 2019

With the help of a few tools and knowledge of their true capabilities, hackers can perform security testing. While talking …

Read More

31

Dec'19

Quark Engine - An Obfuscation-Neglect Android Malware Scoring System

Quark Engine is an open source software for automating analysis of suspicious Android application. To do so it makes use …

Read More

31

Dec'19

Pown.js - A Security Testing An Exploitation Toolkit Built On Top Of Node.js And NPM

Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013