PRINT
PRINT
SEND MAIL
SEND MAIL
TUTORIALS

Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Cyber ThreatsTOP 10 STORIES

Users Warned of Critical PGP Email Encryption Security Flaw

A team of nine academics is warning the world about critical vulnerabilities in the  and  encryption tools. The flaws, if exploited, allow an attacker to decrypt sent or received messages, according to the researcher team. View Full Story ORIGINAL SOURCE: Bleeping Computer The post Users Warned of Critical PGP Email Encryption Security Flaw appeared first on IT SECURITY GURU.

Information GatheringKali LinuxKali ScriptsNetwork DiscoveryNetwork ScannerNEW TOOLSNmapNmap ScriptsPort ScannerSandmapScanService Discovery

Sandmap – A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine

Sandmap is a tool supporting network and system reconnaissance using the massive Nmap engine. It provides a user-friendly interface, automates and speeds up scanning and allows you to easily use many advanced scanning techniques.Key Featuressimple CLI with the ability to run pure Nmap enginepredefined scans included in the modulessupport Nmap Scripting Engine (NSE)TOR support (with proxychains)multiple scans at one timeat this point: 30 modules with 451 scan profilesHow To UseIt's simple:# Clone this repositorygit clone Go into the repositorycd sandmap# Install./setup.sh install# Run…

Cyber ThreatsTHIS WEEK’S GURUS

Five on-the-Ground Insights on Implementing Endpoint Security in the Cloud

Today’s “access-everything-anywhere-anytime” mobile data environment is great news for business productivity and performance but on the flipside it’s also a huge opportunity for cybercriminals. The increasing multitude of endpoints represents an ever-expanding playground in which to develop new ways of infiltrating corporate networks and making off with the digital goods. Malware, ransomware and a rising incidence of fileless attacks all constantly chip away at the perimeter while security pros now have to secure an environment that can comprise thousands of potential attack points. So,…

Cyber ThreatsTHIS WEEK’S GURUS

Compliance comes back into focus

Compliance is something organisations have been grappling with for some time. However, it has come into focus once again with the impending EU General Data Protection Regulation (GDPR). Time is running out. From May 25th, any business that falls foul of a data breach could face a potential fine of €20m, or 4% of annual turnover fines (whichever is greater). Despite increasingly stark warnings in the media, it appears there continues to be a head in the sand mentality towards GDPR and other regulatory…

Cyber ThreatsEDITOR’S NEWS

Is the C-suite exempt from cyber-crime anxiety?

If recent cyber-attacks are anything to go by, cyber-criminals are capable of causing colossal damage to organisations of all sizes. With vital public services such as the NHS succumbing to attacks, it seems that nothing is off the table when it comes down to cyber-criminals deciding who to target. However, according to some reports, the C-suite isn’t sweating over the potential of an attack or the financial fallout if such an attack is successful.   According to one report covered by City A.M., just…

FeaturedFinancial malwareMalware DescriptionsMalware reportsMalware StatisticsMobile MalwarePOS malwareSecurity FeedsTrojan-BankersVulnerabilities and exploits

IT threat evolution Q1 2018. Statistics

Q1 figures According to KSN: Kaspersky Lab solutions blocked 796,806,112 attacks launched from online resources located in 194 countries across the globe. 282,807,433 unique URLs were recognized as malicious by Web Anti-Virus components. Attempted infections by malware designed to steal money via online access to bank accounts were logged on the computers of 204,448 users. Ransomware attacks were registered on the computers of 179,934 unique users. Our File Anti-Virus logged 187,597,494 unique malicious and potentially unwanted objects. Kaspersky Lab products for mobile devices detected:…

APTCyber espionageDATA LEAKFeaturedFinancial malwareHacking TeamIoTmalware descriptionMalware reportsMobile MalwareNation State Sponsored EspionageSecurity FeedsSofacySpearphishingTargeted AttacksTrojan-BankersVulnerabilities and exploitsWiperWormZero-day vulnerabilities

IT threat evolution Q1 2018

Targeted attacks and malware campaigns Skygofree:  sophisticated mobile surveillance In January, we uncovered a sophisticated mobile implant that provides attackers with remote control of infected Android devices.  The malware, called Skygofree (after one of the domains it uses), is a targeted cyber-surveillance tool that has been in development since 2014.  The malware is spread by means of spoofed web pages that mimic leading mobile providers.  The campaign is ongoing and our telemetry indicates that there have been several victims, all in Italy.  We feel…

Hacking FrameworkInformation SecurityNetpwnNetwork SecurityNEW TOOLSSecurity ToolsSocial EngineeringWeb Spider

Netpwn – Tool Made To Automate Tasks Of Pentesting

A framework made to automate tasks of pentesting. Written in python 2.7ScreenshotsInstallgit clone netpwnchmod +x install./installTwitterhttps://twitter.com/3XPL017GH057Download Netpwn

DiscoveryEmailsGathering Email InformationNEW TOOLSSamurai

Samurai Email Discovery – Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name

SED is a email discovery framework created 100% in BASH that grabs emails via google dork, company name, or domain name.Requirementsapt-install lynxScreenshotsPossibly more features such as an OSINT options, and credential reuse discovery & torsocks implimented - but it does the trick for now.Twitter: @0x3curity.Team: @AnonyInfoDownload Samurai