Tools Category

BruteSpray

BruteSpray Brute-Forcing from Nmap output (Automatically attempts default creds on found services) BruteSpray takes nmap GNMAP output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap. Usage First do an nmap scan with ‘-oA nmap.gnmap’. Command: python brutespray.py Read more…

Loading

Tools Category

Unicorn

Unicorn PowerShell downgrade attack   Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Read more…

Loading

Tools Category

TrustlookWannaCryToolkit

WannaCry Toolkit scanner and removal toolkit   Trustlook has released a scanner and removal toolkit to help system administrators protect Windows computers that are either vulnerable to or have been infected with the dangerous strain of ransomware known as WannaCry.| Trustlook WannaCry Toolkit  1. WannaCry Ransomware Scanner Tool The Wannacry Read more…

Loading

Tools Category

Pandas 0.20.1

Pandas 0.20.1 Python data analysis toolkit   Pandas is an open source library licensed by BSD that provides high-performance, easy-to-use data structures and data analysis tools for Python programming languages. Pandas 0.20.1 is another major release since 0.19.2, including many API changes, deprecations, new features, functional improvements, performance improvements, and Read more…

Loading

Microsoft Malware Protection Engine Remote Code Execution Vulnerability

Microsoft Malware Protection Engine Remote Code Execution Vulnerability (CVE-2017-0290)   Vulnerability identify CVE-2017-0290 Vulnerability Finder Natalie Silvanovich and Tavis Ormandy of Google Project Zero Vulnerability An attacker who successfully exploited this vulnerability could execute arbitrary code under the LocalSystem account and control the system. An attacker could install a program; Read more…

Loading

Secret Facebook messages

Facebook is hiding your messages in a ‘secret’ inbox   Here’s how you can read your ‘secret’ Facebook messages Did you know there is a “secret” Facebook Messenger inbox that stores messages that you probably didn’t know existed. This ‘secret’ inbox may contain certain important messages you would like to Read more…

Loading

Intel chips Vulnerability

Intel chips Vulnerability A vulnerability in Intel chips that went undiscovered for almost a decade allows hackers to remotely gain full control over affected Windows PCs without needing a password. The “critical”-rated bug, disclosed by Intel last week, lies in a feature of Intel’s Active Management Technology (more commonly known Read more…

Loading