Evil Clippy v1.1 Releases

Evil Clippy v1.1 releases: hide VBA macros, stomp VBA code and confuse macro analysis tools Evil Clippy A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX, and Windows. This tool was released during Read more…

 4,679 total views,  8 views today

Tools Category

BlueBorne Scanner

BlueBorne Scanner   Step 1: Install BlueBorne Android Scanner & Dependencies Open terminal and Grab the Script on GitHub by hit: git clone https://github.com/hook-s3c/blueborne-scanner.git cd blueborne–scanner pip install –r ./requirements.txt Step 2: Allow Permissions on the Blueborne directory set permission the programs to execute. sudo chmod +x ./bluebornescan.py Step 3: Turn Read more…

 126 total views

About Blueborne !

The latest Bluetooth vulnerability With the number of smart, connected devices on the rise, so are concerns about online privacy and security, especially with the spate of ransomware and other malware attacks dominating the headlines over the past year. Even as the world is trying to recover from the WannaCry Read more…

 393 total views,  2 views today

Most commonly Used Linux Commands

Most commonly Used Linux Commands Basic linux commands with examples tar command examples Create a new tar archive. $ tar cvf archive_name.tar dirname/ Extract from an existing tar archive. $ tar xvf archive_name.tar View an existing tar archive. $ tar tvf archive_name.tar grep command examples Search for a given string in Read more…

 110 total views,  2 views today

Using Nessus and Metasploit

Introduction to Nessus Nessus is a vulnerability scanning and analysis software from tenable, a leading information security services company, known as “the world’s most popular vulnerability scanner, used by more than 75,000 organizations worldwide.” Although the scanner is available for free download, the cost of direct ordering is $ 1,200 Read more…

 104 total views,  2 views today

chkrootkit

Malware & Rootkit detection on Linux   Although the Linux system can be protected from the spread of most malware, it is not absolutely safe. If your data center erected a Linux server, especially the Web server, you should be on the rootkit Trojans and malicious software to prevent, because Read more…

 100 total views