Top 5 Linux and Windows privilege escalation scripts

There are several Linux and Windows privilege escalation scripts freely available online. Here are the Top 5 I found Basic Linux Privilege Escalation (g0tmi1k) Windows Privilege Escalation – a cheatsheet (Tim Arneaud) Linux/Unix privileges from a blackhats perspective Automated Unix Privilege Escalation Check (pentestmonkey) Automated Windows Privilege Escalation Check...

Read More

Dnscat2, a DNS tunnel that WON’T make you sick and kill you

This tool is designed to create a command-and-control (C&C) channel over the DNS protocol, which is an effective tunnel out of almost every network. This README file should contain everything you need to get up and running! If you’re interested in digging deeper into the protocol, how the code is structured, future plans, or other esoteric stuff, check out the doc/ folder....

Read More

Android Application Series Tutorial Security Part 1- 12

The following full series contains some blog post about different types of vulnerabilities which are possible in Android Application’s and there exploitation methods. Link

Read More

Free tool automates phishing attacks for Wi-Fi passwords

The tool can disconnect Wi-Fi users and trick them into disclosing their access password to a rogue access point Link

Read More
Measuring the Leakage of Onion at the Root
Nov13

Measuring the Leakage of Onion at the Root

The Tor project provides individuals with a mechanism of communicating anonymously on the Internet. Furthermore, Tor is capable of providing anonymity to servers, which are configured to receive inbound connections only through Tor—more commonly called hidden services. In order to route requests to these hidden services, a namespace is used to identify the resolution requests to such services. A namespace under a non-delegated...

Read More
ProcDOT: A New way of visual malware analysis.
Nov11

ProcDOT: A New way of visual malware analysis.

There are plenty of tools for behavioral malware analysis. The defacto standard ones, though, are Sysinternals’s Process Monitor (also known as Procmon) and PCAP generating network sniffers like Windump, Tcpdump, Wireshark, and the like. These “two” tools cover almost everything a malware analyst might be interested in when doing behavioral malware analysis. But there’s a major problem with these tools. Any of them works in a so to...

Read More