Blinder : A Python Library To Automate Time-Based Blind SQL Injection

0

Blinder is a small python library to automate time-based blind SQL injection by using a pre-defined queries as a functions to automate a rapid PoC development. Installation You can install it using the following command: pip install blinder Or by downloading the source and importing it manually to your project. Usage To use it you need to import Blinder module then start using the main functions of...

Obfuscapk : Black-Box Obfuscation Tool For Android Apps

0

Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file and to build a new application, after applying some obfuscation techniques on the de-compiled smali code, resources and manifest. The obfuscated app retains the same functionality as the original one, but the differences under the hood sometimes...

Application Inspector : A Source Code Analyzer Built For Surfacing Features Of Interest

0

Microsoft Application Inspector is a software source code analysis tool that helps identify and surface well-known features and other interesting characteristics of source code to aid in determining what the software is or what it does. It has received attention on ZDNet, SecurityWeek, CSOOnline, Linux.com/news, HelpNetSecurity, Twitter and more and was first featured on Microsoft.com. Application Inspector is different...

PythonAESObfuscate : Obfuscates a Python Script & Accompanying Shellcode

0

PythonAESObfuscate is a tool used for Pythonic way to load shellcode. Builds an EXE for you too! Usage Place a payload.bin raw shellcode file in the same directory. Default Architecture is x86run python obfuscate.pyDefault output is out.py Also Read - Cyber Essentials Accreditation and Its Impact to Retail Stores Requirements WindowsPython 2.7PyinstallerPyCrypto (PyCryptodome didn't seem to work) Download

Kali Linux 2020.1 Release

0

We are incredibly excited to announce the first release of 2020, Kali Linux 2020.1. It includes some exciting new updates: Non-Root by defaultKali single installer imageKali NetHunter RootlessImprovements to theme & kali-undercoverNew tools Non-Root Throughout the history of Kali (and its predecessors BackTrack, WHAX, and Whoppix), the default credentials have been root/toor. This is no more. We are no longer...

Socialscan – Check Email Address And Username Availability On Online Platforms With 100% Accuracy

0

Socialscan offers accurate and fast checks for email address and username usage on online platforms. Given an email address or username, socialscan returns whether it is available, taken or invalid on online platforms. Features that differentiate socialscan from similar tools (e.g. knowem.com, Namechk, and Sherlock): 100% accuracy: socialscan's query method eliminates the false positives and negatives that often occur in similar tools, ensuring that results...

CredNinja – A Multithreaded Tool Designed To Identify If Credentials Via SMB

0

CredNinja is a multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter This tool is intended for penetration testers who want to perform an engagement quickly and efficiently. While this tool can be used for more covert operations (including some additions below),...

Cyber Essentials Accreditation and Its Impact to Retail Stores

0

If you aren’t accredited for Cyber Essentials, then you’re missing out on A-L-O-T. If you’re new to the term, Cyber Essentials is basically a government-supported certification class for UK-based industries, businesses, and websites. Highlighting the benefits and value of cybersecurity, this program intends to spur you toward bolstering your efforts to shield your business and customers’ data privacy. It does that by...

Mimir : Smart OSINT Collection Of Common IOC Types

0

Mimir is a smart OSINT collection of common IOC types. This application is designed to assist security analysts and researchers with the collection and assessment of common IOC types. Accepted IOCs currently include IP addresses, domain names, URLs, and file hashes. The title of this project is named after Mimir, a figure in Norse mythology renowned for his knowledge and...

AirCrack-NG : WiFi Security Auditing Tools Suite

0

AirCrack-NG is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools.Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.Testing: Checking WiFi cards and driver capabilities (capture and injection).Cracking: WEP and WPA...