Month: October 2020

NEW TOOLSDevopsDevsecopsAPICheck

APICheck – The DevSecOps Toolset For REST APIs

APICheck is a complete toolset designed and created for testing REST APIs. Why APICheck APICheck focuses not only in the security testing and hacking use cases. The goal of the project is to become a complete toolset for DevSecOps cycles. The tools are aimed to diverse users profiles: Developers System Administrators Security Engineers & Penetration TestersDocumentation Here you can find the complete documentation. Authors APICheck is being developed by BBVA Innovation Security Labs team. Download Apicheck

NEW TOOLSPython3XSSXSS DetectionMachine LearningElasticsearchPost ExploitationSiemDashboardNethive-Project

Nethive-Project – Restructured And Collaborated SIEM And CVSS Infrastructure

The Nethive Project provides a Security Information and Event Management (SIEM) insfrastructure empowered by CVSS automatic measurements. Features Machine Learning powered SQL Injection Detection Server-side XSS Detection based on Chrome's XSS Auditor Post-exploitation Detection powered by Auditbeat Bash Command History Tracker CVSS Measurement on Detected Attacks Realtime Log Storing powered by Elasticsearch and Logstash Basic System Monitoring Resourceful Dashboard UI Notify Suspicious Activity via Email Installation Before installing, please make sure to install the pre-requisites. You can install Nethive from PyPi package manager using…

NEW TOOLSReverse EngineeringIDA ProHexadecimalIDABinbloom

Binbloom – Raw Binary Firmware Analysis Software

The purpose of this project is to analyse a raw binary firmware and determine automatically some of its features. This tool is compatible with all architectures as basically, it just does simple statistics on it. In order to compute the loading address, you will need the help of an external reverse engineering tool to extract a list of potential functions, before using binbloom. Main features: Loading address: binbloom can parse a raw binary firmware and determine its loading address. Endianness: binbloom can use heuristics…


KB-Vuln: 3 Vulnhub Walkthrough

Today we are going to solve another boot2root challenge called “KB-VULN: 3”.  It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to Machine. Let’s start and learn how to break it down successfully. Level: Eas Penetration Testing Methodology Reconnaissance Netdiscover Nmap Enumeration... Continue reading → The post KB-Vuln: 3 Vulnhub Walkthrough appeared first on Hacking Articles.

NEW TOOLSNodeJSCommand LineEmulatorTerminalCustomizableMinifyEdex UiScience FictionTouchscreenUnixporn

eDEX-UI – A Cross-Platform, Customizable Science Fiction Terminal Emulator With Advanced Monitoring &Touchscreen Support

eDEX-UI is a fullscreen, cross-platform terminal emulator and system monitor that looks and feels like a sci-fi computer interface. Heavily inspired from the TRON Legacy movie effects (especially the Board Room sequence), the eDEX-UI project was originally meant to be "DEX-UI with less « art » and more « distributable software »". While keeping a futuristic look and feel, it strives to maintain a certain level of functionality and to be usable in real-life scenarios, with the larger goal of bringing science-fiction UXs to…

NEW TOOLSJavaScriptCryptographyChrome ExtensionMimicAnti-DebuggingDecryptionWidevineWidevine L3Widevine-L3-Decryptor

Widevine-L3-Decryptor – A Chrome Extension That Demonstrates Bypassing Widevine L3 DRM

Widevine is a Google-owned DRM system that's in use by many popular streaming services (Netflix, Spotify, etc.) to prevent media content from being downloaded. But Widevine's least secure security level, L3, as used in most browsers and PCs, is implemented 100% in software (i.e no hardware TEEs), thereby making it reversible and bypassable. This Chrome extension demonstrates how it's possible to bypass Widevine DRM by hijacking calls to the browser's Encrypted Media Extensions (EME) and decrypting all Widevine content keys transferred - effectively turning…

NEW TOOLSRDPVNCNmapHTML ReportEyeWitnessSocks5DirbleScrying

Scrying – A Tool For Collecting RDP, Web And VNC Screenshots All In One Place

A new tool for collecting RDP, web and VNC screenshots all in one place This tool is still a work-in-progress and should be mostly usable but is not yet complete. Please file any bugs or feature requests as GitHub issuesCaveats Web screenshotting relies on Chromium or Google Chrome being installed Motivation Since Eyewitness recently dropped support for RDP there isn't a working CLI tool for capturing RDP screenshots. Nessus still works, but it's a pain to get the images out and they're not included…

TUTORIALSCyber Forensics

Memory Forensics: Using Volatility Framework

Cyber Criminals and attackers have become so creative in their crime type that they have started finding methods to hide data in the volatile memory of the systems. Today, in this article we are going to have a greater understanding of live memory acquisition and its forensic analysis. Live Memory acquisition is a method that... Continue reading → The post Memory Forensics: Using Volatility Framework appeared first on Hacking Articles.

NEW TOOLSVulnerability Analysisandroid malwareStatic Code AnalysisAndroid AwesomeAndroid CookbookAndroid PentestingAwesome-Android-Security

Awesome Android Security – A Curated List Of Android Security Materials And Resources For Pentesters And Bug Hunters

A curated list of Android Security materials and resources For Pentesters and Bug Hunters.Blog AAPG - Android application penetration testing guide TikTok: three persistent arbitrary code executions and one theft of arbitrary files Persistent arbitrary code execution in Android's Google Play Core Library: details, explanation and the PoC - CVE-2020-8913 Android: Access to app protected components Android: arbitrary code execution via third-party package contexts Android Pentesting Labs - Step by Step guide for beginners An Android Hacking Primer An Android Security tips OWASP Mobile…