A simple script to generate a hidden url for social engineering.Legal disclaimer:Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It’s the
Read more
All categories. All articles from all categories.
A simple script to generate a hidden url for social engineering.Legal disclaimer:Usage of URLCADIZ for attacking targets without prior mutual consent is illegal. It’s the
Read moreGet ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate limit!)Usage # python3 shodanfy.py <ip> [OPTIONS] e.g: python3 shodanfy.py 111.111.111.111 python3 shodanfy.py 111.111.111.111 –getports
Read moreToday we’re going to solve Hack The Box’s “Monteverde” machine. This lab is of “medium” level, although you will see that it is quite simple.
Read moreA bug has been fixed in AVG and Avast security applications that set registry keys that blocked applications from running in Windows 10. This past week,
Read moreThe Microsoft June 2020 Patch Tuesday consisted of 129 security fixes for critical and important vulnerabilities. Of these, an “Important” and equally ironic vulnerability, tracked as CVE-2020-1296,
Read moreOperators of Black Kingdom ransomware are targeting enterprises with unpatched Pulse Secure VPN software or initial access on the network, security researchers have found. The
Read moreKeyLogger for Linux Systems. Features Runs on GUI systems or CLI Sending data by email Dependencies curl libx11-dev (Debian-Based) libX11-devel (RHEL-Based) Compiling # ./configure #
Read moreIn this post, we are going to discuss the domain cache credential attack and various technique to extract the password hashes by exploiting domain user.
Read moreADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you a basic understanding of the
Read moreThe tool predicts attacker groups from techniques and softwares used. It searches based on the MITRE ATT&CK framework How it works? 1- Collect data from
Read moreAttacks picked up at a rapid pace this week as well-known companies and cities were targeted with ransomware that impacted their networks. This week we
Read more