PRINT
PRINT
SEND MAIL
SEND MAIL

Month: June 2019

NEW TOOLSMacPython3CSV FileIDALst2X64Dbg

Lst2X64Dbg – Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database

This script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted labels.The LST file can be generated in IDA from the File menu: Produce file -> Create LST file...Example$ python3 lst2x64dbg.py sample.lstghidra2x64dbgThis script extracts all the labels found in the CSV file that is given as the script's single argument. An x64dbg database is created in the current directory based on the extracted…

NEW TOOLSMacWrapperSpyse.Py

Spyse.Py – Python API Wrapper And Command-Line Client For The Tools Hosted On Spyse.Com

Python API wrapper and command-line client for the tools hosted on spyse.com."Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL / TLS encryption certificate providers, data centers and business analysts. All Spyse online solutions are represented by thematic services that have a single platform for collecting, processing and aggregating information." - spyse.comSupports the following APIs:DNStableFindSubdomainsCertDBASlookupPortMapDomainsDBNOTE: This API is currently under active development.Installationpip3 install spyse.pyUsing the clientRequired Arguments-target-paramOptional Arguments-page-apikey--rawThe deal with parametersSpyse allows you to…

NEW TOOLSMacpenetration testingExploitation FrameworkBeEFPTFUp-to-date

PTF v2.3 – The Penetration Testers Framework Is A Way For Modular Support For Up-To-Date Tools

The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters, we've been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those "go to" tools that we use on a regular basis, and using the latest and greatest is important.PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and…

NEW TOOLSPython3Network SecurityPcapNetwork VisualizationPacket CapturePacket CraftingNetwork DiscoveryNetwork AnalysisScapyPacket SnifferPacket AnalyserPython2

Scapy – The Python-based Interactive Packet Manipulation Program & Library

Scapy is a powerful Python-based interactive packet manipulation program and library.It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work.It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk,…

NEW TOOLSHacking NewsNEWSPodcastscyber security newscyber security podcastcyberwiredaily hack newshack newshack news podcastlatest hacking news podcastlhnlhn podcastthe hacker news

Latest Hacking News Podcast #315

New Variant of the Dridex Banking Trojan with new Obfuscation Attacks Underway, Excel Power Query can be Exploited, DHS Warns Latest Hacking News Podcast #315 on Latest Hacking News.

NEW TOOLSWebserverTwitter-IntelligenceTwitterShadowBanTwitterShadowBanV2

TwitterShadowBan – Twitter Shadowban Tests

One-page web app, testing Twitter users for conventional and QFD shadowbans.SetupBrowser compatibility needs transpiling. Nothing fancy, just the usual babel magic.git clone && cd TwitterShadowBanV2npm installSince we are using a php backend for request proxying, you will also need PHP. The gulp script uses php-cli's webserver.[Debian]apt-get install php7.2-cliFinally, use the default gulp task to start the php-cli webserver and watching for file changes.npm startDeployRun npm start build! This creates an uglified script bundle and uses minified versions of 3rd party scripts. Then copy…

NEW TOOLSHacking NewsNEWScyber security newsCyber AttackADA coinsBitrue crypto exchangeBitrue crypto exchange hackBitrue cryptocurrency exchangeBitrue cryptocurrency exchange hackedBitrue hackedCardano coinscrypto exchangecrypto exchange hackcrypto hackcrypto wallet addresscrypto wallet hackcryptocurrency exchangecryptocurrency exchange hackCryptocurrency hackcryptocurrency theftXRP

Bitrue Crypto Exchange Hacked Losing Over $4.5 Million Worth Of Cryptocurrency

It has been little more than a month since the massive hacking attempt on Binance cryptocurrency exchange. Yet, the hackers Bitrue Crypto Exchange Hacked Losing Over $4.5 Million Worth Of Cryptocurrency on Latest Hacking News.

Cyber ThreatsCyber Bites

Met police face order over data request handling.

The ICO has given Met officials until September to implement appropriate measures. The Information Commissioner’s Office has slapped the Metropolitan Police with two enforcement orders over its handling of data requests. After launching an investigation, the ICO discovered a backlog of more than 1,100 open data requests from UK citizens. Describing this as a ’cause for concern’, the ICO said nearly 680 of them were over three months old. Source: Computing The post Met police face order over data request handling. appeared first on…

Cyber ThreatsCyber Bites

Defending against quantum computing’s dark side.

ABN Amro is working with QuTech to ensure that banks can protect data against quantum computers in the future. Netherlands bank ABN Amro is working with researchers to explore how quantum computing technology can be used to secure online banking. The banking giant is working with QuTech, which was jointly established by Delft University of Technology and the Netherlands Organisation for Applied Scientific Research, to prove that quantum key distribution can be used to secure data traffic. Source: Computer Weekly The post Defending against…