Pythem – Penetration Testing Framework

0

Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. The tool intended to be used only for acts within the law. I am not liable for any undue and unlawful act practiced by this tool, for more information, read the license. Linux Installation Dependenciesbuild-essentialpython-devpython-capstonelibnetfilter-queue-devlibffi-devlibssl-devtcpdump Dependencies Installation NOTE: Tested only with...

The Role of Digital Forensics in Solving Cyber Crimes

0

Your mobile app developers today have to understand more than simply putting together some code. They have to understand cybersecurity practices so that they can prevent their apps from being hacked and compromised. Criminals today have quickly realized that the internet has opened up some very rich pickings. From phishing emails to gather your personal data through to actual...

SAyHello – Capturing Audio (.Wav) From Target Using A Link

0

SAyHello is a tool used to capturing audio (.Wav) from target using a link. How it works? After the user grants microphone permissions, a website redirect button of your choice is released to distract the target while small audio files (about 4 seconds in wav format) are sent to the attacker. It uses Recorderjs, plugin for recording/exporting the output of Web...

Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems

0

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made. There is a risk of breaking your existing configuration.Lynis is an open source security auditing tool. Used by system administrators, security professionals, and auditors, to evaluate...

Recon : Enumerate A Target Based Off Of Nmap Results

0

Recon enumerate a target based off Of Nmap results. Features The purpose of O.G. Auto-Recon is to automate the initial information gathering phase and then enumerate based off those results as much as possible.This tool is intended for CTF's and can be fairly noisy. (Not the most stealth conscious tool...)All tools in this project are compliant with the OSCP exam rules.Command...

Why is Cyber Crime Starts Growing? Detailed Report

0

In the era of modern technologies when almost all the data about us is available online, the level of cyber crime is constantly growing. Nowadays, we can clearly see the steady stream of technological advancements that impede cybersecurity. Using special tools a criminals can steal secret information from IT systems and use it for a cyber threat. Cybercrime evolves every...

Why Are Exam Dumps the Best Study Material for Your CompTIA SY0-501 Test?

0

Baseline cybersecurity skills and techniques are extremely vital if you want to help solve a number of information security issues. To become a qualified specialist who can effectively carry out these tasks, you must have the latest skills in the field. They are risk mitigation, intrusion detection, as well as risk and threat management. The good thing is that...

Zip Cracker : Python Script To Crack Zip Password With Dictionary Attack

0

Zip Cracker is a python script To crack zip password With dictionary attack and also use crunch as Pipeline. This Script Supports Only Zip File in This VersonYou Can Also Use This Script With crunchCross-platform Supported Usage Options:--version show program's version number and exit-h, --help show this help message and exit-f FILENAME, --file=FILENAMEPlease Specify Path of Zip File-d DICTIONERY, --dict=DICTIONERYPlease Specify Path...

DroidTracker – Script To Generate An Android App To Track Location In Real Time

0

DroidTracker is a script to generate an Android App to track location in real time. Features Custom App Name2 Port Forwarding options (Ngrok or using SSH Tunneling with Serveo.net)Obfuscated URL by TinyurlFully Undetectable Auto Install bash install.sh Also Read - KatroLogger : KeyLogger for Linux Systems Installing on Kali Linux Install dependencies:$apt-get update$apt-get install default-jdk apksignerFor x86:$-get install libc6-dev-i386 lib32z1For AMD64:$apt-get install lib32z1 lib32ncurses6 lib32stdc++6Download SDK-Tools:$wget...

IOX : Tool For Port Forward & Intranet Proxy

0

IOX is a tool for port forward & intranet proxy, just like lcx/ew, but better. Why Write? lcx and ew are awesome, but can be improved. when I first used them, I can't remember these complicated parameters for a long time, such as tran, slave, rcsocks, sssocks.... The work mode is clear, why do they design parameters like this(especially ew's -l -d...