5 Essential Tips to Protect Your Student Data Privacy

0

The rapid advancement of technology has made it easier for students to protect their information and engage with their teachers in class thus making learning easier and efficient. Technology has made it easier for teachers to collaborate with their students during sessions. When using education technological tools, you have to collect the relevant student data so that you can tailor your teaching techniques accordingly....

EVABS : An Open Source Android Application That Is Intentionally Vulnerable

0

EVABS is an open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security beginners. The effort is to introduce beginners with very limited or zero knowledge to some of the major and commonly found real-world based Android application vulnerabilities in a story-based, interactive model. EVABS follows a level-wise difficulty...

4CAN : Open Source Security Tool to Find Security Vulnerabilities in Modern Cars

0

4CAN is an open source security tool to find security vulnerabilities in modern cars. Tested on the following raspbian images using a pi3b+ Apr 2019 (kernel 4.14.98-v7+)Oct 2018 (kernel 4.14.71-v7+)Jun 2018 (kernel 4.14.50-v7+) 4can should also work with a pi0w, but it's recommended to use at least a pi3b. Also recommend using a heatsink on the pi, because the pi...

AIL Framework : Analysis Information Leak Framework

0

AIL framework is for Analysis of Information Leaks. AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information (e.g. data leak prevention). Features Modular architecture to handle streams...

Airgeddon : This Is A Multi-Use Bash Script For Linux Systems To Audit Wireless Networks

0

Airgeddon is a multi-use bash script for Linux systems to audit wireless networks. Content & Features HomeFeaturesScreenshotsWallpapers Requirements RequirementsCompatibilityEssential ToolsOptional ToolsBeEF TipsHashcat TipsBettercap TipsUpdate ToolsInternal ToolsKnown incompatibilities Also Read - AutoRDPwn : The Shadow Attack Framework Installation & Usage It is essential to run this script as root, otherwise airgeddon won't work properly. Generic Installation Installation method 1(easiest) Requirements: git Clone the repository ~$ git clone --depth 1 https://github.com/v1s1t0r1sh3r3/airgeddon.git Go to the...

Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

0

Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate. The tool is supposed to be scheduled to run periodically at fixed times, dates, or intervals (Ideally each day). New identified subdomains will be sent to Slack workspace with a notification push. Furthermore, the tool...

IPRotate : Extension For Burp Suite Which Uses AWS API Gateway To Rotate Your IP On Every Request

0

IPRotate is a tool used for Burp Suite which uses AWS API Gateway to change your IP on every request. This extension allows you to easily spin up API Gateways across multiple regions. All the Burp Suite traffic for the targeted host is then routed through the API Gateway endpoints which causes the IP to be different on each...

LdapDomainDump : Active Directory Information Dumper via LDAP

0

LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can be retrieved via LDAP by any authenticated user (or machine). This makes LDAP an interesting protocol for gathering information in the recon phase of a pentest of an internal network. A problem is that data from LDAP often is...

Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

0

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers. Covenant is an ASP.NET Core, cross-platform application that includes a web-based interface that allows for multi-user collaboration. Also Read - Hacktronian : All in...

AutoRDPwn : The Shadow Attack Framework

0

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature by Microsoft) allows a remote attacker to view his victim's desktop without his consent, and even control it on demand, using tools native to the operating system itself. Thanks to the additional modules, it is possible to obtain...