Blog

Latest news around the world

20

May'22

Mip22 An advanced phishing tool

The program is made for educational purposes only to see how the phishing method works. Any unnecessary use of the …

Read More

19

May'22

Osmedeus is a Workflow Engine for Offensive Security

What is Osmedeus? Osmedeus is a Workflow Engine for Offensive Security. It was designed to build a foundation with the …

Read More

10

May'22

Sooty - The SOC Analysts all-in-one CLI tool to automate and speed up workflow

Sooty is a tool developed with the task of aiding SOC analysts with automating part of their workflow. One of …

Read More

10

May'22

10+ Best Software for Coding by Jessica Bullet

So you want to learn how to code programs and software, but you don’t know where to start? Or maybe …

Read More

05

May'22

Deep-Dive Analysis of Avos Locker Ransomware by Mila Bera

The days of silly malware that spewed annoying but ultimately harmless insults like that legendary “You are an idiot” trojan …

Read More

02

May'22

Lupo - Malware IOC Extractor and Debugging module for Malware Analysis Automation

Introduction Working on security incidents that involve malware, we come across situations on a regular basis where we feel the …

Read More

02

May'22

29

Apr'22

Securing Web Applications in 2022: XDR, DAST, PTaaS & More by Gilad David Maayan

What is Web Application Security? Web application security involves protecting websites and web applications from security threats, most of which …

Read More

28

Apr'22

ADReaper - A fast enumeration tool for Windows Active Directory Pentesting written in Go

ADReaper is a tool written in Golang which enumerates an Active Directory environment with LDAP queries within few seconds Installation You can download …

Read More

28

Apr'22

Domain Takeover with PetitPotam Exploit by Nairuz Abulhul

Petitpotam is a vulnerability that allows a domain user to take over domain controllers through triggering authentications using the MS-EFSRPC …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
GET A FREE EDITION!
Join our newsletter and receive for FREE, our premium edition “Brute Force and Supply Chain Attacks”
x