Evil Clippy v1.1 Releases

Evil Clippy v1.1 releases: hide VBA macros, stomp VBA code and confuse macro analysis tools Evil Clippy A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX, and Windows. This tool was released during Read more…

Loading

Tools Category

BlueBorne Scanner

BlueBorne Scanner   Step 1: Install BlueBorne Android Scanner & Dependencies Open terminal and Grab the Script on GitHub by hit: git clone https://github.com/hook-s3c/blueborne-scanner.git cd blueborne–scanner pip install –r ./requirements.txt Step 2: Allow Permissions on the Blueborne directory set permission the programs to execute. sudo chmod +x ./bluebornescan.py Step 3: Turn Read more…

Loading

About Blueborne !

The latest Bluetooth vulnerability With the number of smart, connected devices on the rise, so are concerns about online privacy and security, especially with the spate of ransomware and other malware attacks dominating the headlines over the past year. Even as the world is trying to recover from the WannaCry Read more…

Loading

Using Nessus and Metasploit

Introduction to Nessus Nessus is a vulnerability scanning and analysis software from tenable, a leading information security services company, known as “the world’s most popular vulnerability scanner, used by more than 75,000 organizations worldwide.” Although the scanner is available for free download, the cost of direct ordering is $ 1,200 Read more…

Loading

chkrootkit

Malware & Rootkit detection on Linux   Although the Linux system can be protected from the spread of most malware, it is not absolutely safe. If your data center erected a Linux server, especially the Web server, you should be on the rootkit Trojans and malicious software to prevent, because Read more…

Loading