Security Cheat Sheets for Penetration Testing

Security cheat sheets for Penetration Testing by sniferl4bs. This cheat sheet is especially for penetration testers/CTF participants/security enthusiasts. Download and Extract Command: wget https://github.com/Snifer/security-cheatsheets/archive/master.zip unzip master.zip Contents: aircrack-ng airport burp cewl cidr cookies dig fierce ftp golismero hping http https-ssl-tls hydra john maltego markdown medusa metasploit msfvenom mysql ncat nessus nikto Read more…

Loading

Critical Vulnerability In Skype

CyberSecurity Researcher Found Stack Buffer Overflow Vulnerability In Microsoft Skype Software Vulnerability Lab Security researcher Benjamin Kunj Mejri discovered a Stack Buffer Overflow Vulnerability in the official Microsoft Skype v7.2, v7.3.5.103 & v7.3.6 software. Technical Details & Description: A remote and local stack buffer overflow vulnerability has been discovered in Read more…

Loading

Tools Category

Browser Exploitation Framework (BeEF)

  BeEF is short for The Browser Exploitation Framework. it’s a testing tool designed to enable penetration testers to launch client-side attacks against target browsers. By using techniques similar to common drive-by malware, testers can assess the security of a target’s internal environment, bypassing the hardened perimeter. Growing concerns about Read more…

Loading

Tools Category

NoobSecToolkit

NoobSecToolkit is a Python Based Tool kit that brings together powerful security and anonymity tools and scripts with predefined security configurations and modifications. Making it very simple for students to get started with security! – Leo Edge Install Instructions (1) CTRL + ALT + T (Open Terminal) (2) git clone Read more…

Loading

Tools Category

SigPloit

A Telecom Signaling Exploitation Framework – SS7, GTP, Diameter And SIP     SiGploit a signaling security testing framework dedicated to Telecom Security professionals and researchers to pentest and exploit vulnerabilities in the signaling protocols used in mobile operators regardless of the generation being in use. SiGploit aims to cover Read more…

Loading