Author: Black Hat Sec


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cyber Threats

CySure Partners With Frost Solutions To Deliver Cyber Security Services In South Africa.

Cyber security specialist CySure Ltd has appointed Frost Solutions as a specialist value added reseller partner in South Africa. Frost Solutions specializes in delivering IT services to the small and medium size enterprises (SMEs) market and has added CySure’s information security management system, VOSO to its product and service portfolio. Richard Frost, CEO and Founder at Frost Solutions said, “We are delighted to introduce CySure’s Virtual Online Security Officer (VOSO) to our offering. Our vision is to provide market leading services to our clients…

Cyber Threats

€1bn In Cyber Security Research Funding Evaluated, Revealing Academic Trends And Threats For 2019 And Beyond.

Crossword Cybersecurity plc (AIM:CCS), the cyber security technology commercialisation company, has today released insights from its global review of academic cyber security research. The new database looked at nearly 1,200 current and past research projects from academic institutions in the United Kingdom, United States, Europe, Australia, and Africa. It reaffirmed the value of the cyber security research market, with reported funding of EU projects at over €1 billion. The database identified several global trends by comparing the periods January 2008 to June 2013 with…

ChromecastKillcastNEW TOOLSPython3

Killcast – Manipulate Chromecast Devices In Your Network

Manipulate Chromecast Devices in your Network.Inspiration - Thousands of Google Chromecast Devices Hijacked to Promote PewDiePieThis tool is a Proof of Concept and is for Research Purposes Only, killcast shows how Chromecast devices can be easily manipulated and hijacked by anyone.FeaturesExtract Interesting Information such as Build Version, Country, Timezone etcRenameRebootPerform Factory ResetKill Active Applications such as YouTube, Netflix and Google Play MusicWhat is not workingPlay any YouTube VideoUnable to kill Play MusicOther things that we are not aware of ;)Tested On :Kali Linux 2019.1Ubuntu…

Security conferenceSecurity Feeds

The world’s southernmost security conference

When asked about his best race, Ayrton Senna replied that it was when he raced karting cars. For him it was the best because it was only for the sake of sports and free from commercial sponsoring and commercial interests. I have this same feeling about computer security conferences, because they attract people who really seek knowledge, both to receive and to share it. In November I had the privilege of participating in a conference that can rightfully be labelled the world’s southernmost. It…

Brute Force AttackBrute-forceHediyeMacNEW TOOLSWordlist

Hediye – Hash Generator & Cracker Online Offline

Hash Generator & Cracker Online Offline suported hash:md5sha1sha224sha256sha384sha512Install NoteClone the repository:git clone go inside:cd hediye/use examples:python3 -k Key / For --> Generate Hash (md5, sha1, sha224, sha256, sha384, sha512)python3 -v HASH -f Wordlist / For --> Brute Force Attackpython3 -n HASH / For --> Online SearchGenerate Hashpython3 -k 4617165Brute Force AttackOnline SearchDownload Hediye

Cyber ThreatsFeaturedThe Internet of Things

Multi-Purpose Attack Thingbots Threaten Internet Stability And Human Life.

New research from F5 Labs has revealed that IoT devices are now cybercriminals’ top attack target, surpassing web and application services, and email servers. Gartner currently estimates that the number IoT devices will surge to 20,4 billion by 20201, which represents a staggering 143% growth rate over three years. “IoT devices already outnumber people and are multiplying at a rate that far outpaces global population growth. Increasingly, lax security control could endanger lives as, for example, cellular-connected IoT devices providing gateways to critical infrastructures…

Cyber ThreatsFeatured

IoMT Fraud Platform Cynerio Secures $7 Million Funding To Drive US Market Development.

Cynerio today announced the completion of its $7 million funding round to fuel growth in North America for its 100% healthcare focused cyber security platform. Investors include global VCs, Accelmed, a leading investment firm focused on value creation for medical device companies and technologies, RDC (a joint venture between Elron and Rafael), which invests in exceptional medical device and cybersecurity companies and MTIP, a leading venture capital firm who is an expert in digital health. “Cynerio is committed to protecting the future of healthcare…

Cyber Threats

A10 Networks Thunder® Convergent Firewall Selected for 5G Network Deployment By Major Japanese Mobile Carrier.

A10 Networks (NYSE: ATEN), a leading provider of intelligent and automated cybersecurity solutions, today announced a major Japanese mobile carrier has selected the A10 Thunder® Convergent Firewall (CFW) Gi/SGi firewall solution for its 5G production network, to support the huge network capacity and throughput of 5G and reduce total cost of infrastructure. A10 Networks has a long and successful relationship with the service provider, who uses a wide variety of A10 solutions for such services as DDoS protection, Carrier Grade NAT (CGNAT) and application…

Cyber ThreatsFeaturedThe Internet of Things

Parkbob Teams Up With Amazon At CES To Launch New Alexa Skill To Help You Park In Major U.S. Cities.

The Austrian start-up Parkbob has teamed up with Amazon to launch a new skill for Alexa-enabled devices at CES in Las Vegas, including the Anker Roav, Garmin Speak and soon, Echo Auto. The Parking Made Easy-Skill lets customers ask Alexa how long they can stay in their current parking spot or the location of the next multi-storey car park. Customers must opt-in for Alexa to share their location data with the skill through the Alexa app. Initially, the skill supports 13 of the largest…