A Closer Look At The Brushless DC Electric Motor

0

The brushless DC electric motor (also known as BL motor, BLDC motor or electronically commutated motor) is one of the synchronous motors that are powered with the use of DC electricity. This is possible through switching power supply or an inverter. This produces AC current to drive the motor’s phases through closed look controllers. A brushless motor controller offers current pulses to the windings...

Kali NetHunter App Store Dedicated to Free Security Apps

0

The Kali NetHunter App Store is an installable catalogue of Android applications for penetration testing and forensics. The client makes it easy to browse, install, and keep track of updates on your device. The Kali NetHunter App Store is a repository of free security related software on the Android platform, along with an Android client to perform installations and...

Userrecon PY : Recognition Usernames In 187 Social Networks

0

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have a look on the step to install the same; Install dependencies (Debian/Ubuntu): sudo apt install python3 python3-pip Install with pip3: sudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git userrecon-py --help Also Read - Shellsum : A Defense Tool – Detect Web Shells In Local Directories...

Explo : Human & Machine Readable Web Vulnerability Testing Format

0

Explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow, explo is able to exploit security issues without the need of writing a script. This allows to share complex vulnerabilities in a simple readable and executable format. Example for extracting a csrf token and using this in a...

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

0

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan, ncrack, dsss and gives you the flexibility of using them with a combination. The main goal of this project is auditing as many system as possible in country-wide or in a...

Brute Force : BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix

0

In this article we will see on how to BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix. First let us see on how to install the same; pip install proxylist pip install mechanize Also Read - JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark G Usage BruteForce Gmail Attack python3 Brute_Force.py -g Account@gmail.com -l File_list python3 Brute_Force.py -g Account@gmail.com -p Password_Single BruteForce...

DIE : Program For Determining Types Of Files For Windows, Linux & MacOS

0

Detect It Easy, or abbreviated DIE is a program for determining types of files. It is a cross-platform application, apart from Windows version there are also available versions for Linux and Mac OS. Many programs of the kind (PEID, PE tools) allow to use third-party signatures. Unfortunately, those signatures scan only bytes by the pre-set mask, and it is not...

Machinae : Machinae Security Intelligence Collector

0

Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data: IP addresses, domain names, URLs, email addresses, file hashes and SSL fingerprints. It was inspired by Automater, another excellent tool for collecting information. The Machinae project was born from wishing to improve Automater in 4 areas: Codebase - Bring Automater to python3 compatibility while making...

Fake Sandbox : Script To Simulate Fake Processes Of Analysis Sandbox/VM

0

Fake Sandbox Processes small script will simulate fake processes of analysis, sandbox and VM software that some malware will try to avoid. You can download the original script made by @x0rz here (thanks, by the way). You can also download my slightly optimised script from the root directory. The file is named fsp.ps1. This exact script is also used...

Blind SQL Bitshifting : A Blind SQL Injection Module That Uses Bitshfting To Calculate Characters

0

This is a module that performs blind SQL injection by using the bitshifting method to calculate characters instead of guessing them. It requires 7/8 requests per character, depending on the configuration. Usage import blind-sql-bitshifting as x#Edit this dictionary to configure attack vectorsx.options Also Read - Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of PyQt5 & Frida Example Configuration #Vulnerable linkx.options = "http://www.example.com/index.php?id=1"#Specify...