Uncategorized

pamspy - Credentials Dumper for Linux using eBPF

pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. https://github.com/citronneur/pamspy It will track a particular userland function inside …

Aug 08,2022

4 min read

UEFI_RETool - A tool for UEFI firmware reverse engineering

UEFI firmware analysis with uefi_retool.py script Usage: Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins directory Edit config.json file …

Aug 06,2020

6 min read

r00kie-kr00kie: PoC exploit for the CVE-2019-15126 kr00k vulnerability

r00kie-kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot be …

Apr 03,2020

16 min read

Subfinder is a subdomain discovery tool that discovers valid subdomains for websites

subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a …

Mar 02,2020

15 min read

Sourish Das OfficialNew

Regular Expression Denial of Service

Service uptime and availability is a crucial factor that determines the success of online businesses. In a rapidly evolving world, …

May 24,2023

11 min read

External Understanding: Dissecting APIs inside of IoT devices (Part2)

Introduction If you have not read Part 1, it is highly suggested that you do so. This article is the …

May 23,2023

32 min read

External Understanding: Dissecting APIs inside of IoT devices (Part 1)

Introduction As the world of IoT evolves, so does the security within this realm, like most fields. One of the …

May 18,2023

32 min read

D4RKR4BB1T47 OfficialNewCrime Corner

Engaging Social Engineering: Extracting Information through Strategic Interactions

Editorial note: We decided to remove any and all last names from the examples section as to not be drawn …

May 18,2023

4 min read

Hacking Blockchain based APIs (W69)

Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.

Mar 11,2023

9 min read

Penetration testing OWASP Top 10 Vulnerabilities (W68)

OWASP Top 10 is the standard awareness for web application security and developers; it covers a broad area of most critical security risks to web application security. Almost every company adopts OWASP Top 10 approach to secure web applications and minimize the risks. Any penetration testers going to work within an organization need to follow the Top 10 to ensure application security and minimize the risks to the organization. This course is going to do the same in the practical scenario of how you can test for OWASP Top 10 vulnerabilities in more effective ways.

Mar 08,2023

15 min read

IoT Security - the DVID Challenge - NEW EDITION (W67)

IoT is a growing market and will be the future of our daily lives. Because of its emergence, there is no standard to steward the development process but many protocols and custom solutions to connect hardware to a cloud. Sometimes, a middleware (like smartphone application) could be encountered between hardware and cloud.

Mar 07,2023

27 min read

OSINT Fundamentals (W66)

This course focuses on Open-Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in: *Gaining a better understanding of OSINT techniques *Improving investigative skill set *Improving overall research methodology *Improving personal OPSEC OSINT is one of the key skills required for both Red and Blue Team jobs - if you want to put these skills in your resume with confidence, this course will help!

Aug 23,2022

11 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023