Danies Pahlevi

53 Added | 3 Magazines | 1 Like | @danies | Keep up with Danies Pahlevi on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Danies Pahlevi”

LazyMap - Auto NMAP Scanning Script

Automate NMAP scans and custom Nessus polices.<p>Developed by Daniel Compton<p>https://github.com/commonexploits/port-scan-automation.git<p>Released under …

bmon – A Powerful Network Bandwidth Monitoring and Debugging Tool for Linux

bmon is a simple yet powerful, text-based network monitoring and debugging tool for Unix-like systems, which captures networking related statistics …

Debugging

Tater - A PowerShell implementation of the Hot Potato Windows Privilege Escalation Exploit

Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit. <b> <br>Included In</b> <br>• p0wnedShell - …

Forensics

How To: Use Acccheck to Extract Windows Passwords Over Networks

Sometimes you need a password to gain access to an older running Windows system. Maybe it's a machine in your basement you forgot about or a locked …

Linux

credmap v0.1 - The Credential Mapper

Credmap is an open source tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user …

Information Security

WMD (Weapon of Mass Destruction) - Python framework for IT security tools

This is a python tool with a collection of IT security software. The software is incapsulated in "modules". The modules does consist of pure python …

Cybersecurity

NirSoft releases LoadedDLLsView

Freeware machine NirSoft has unveiled its latest system tool, LoadedDLLsView (32-bit version).<p>If you don’t know what the program does from the name …

Universal MITM Web Server: CopyCat

CopyCat is a Node.js based universal MITM web server. Used with DNS spoofing or another redirect attack, this server will act as a MITM for web …

Smith - A Very Quick And Very Dirty Client/Server Tool For Testing Firewalls

A client/server style agent meant for testing connectivity to and from a machine on a network. <b> <br>Installation</b> <br>python setup.py install or pip install . …

Linux

vsaudit

This is an opensource tool to perform attacks to general voip services It allows to scans the whole network or single host to do the gathering phase, …

Linux

wafpass - WAF Security Benchmark

<b></b> <br>WAFPASS Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.<br>Today a great number of website …

Web Framework

TheFatRat v1.8 - Easy Tool For Generate Backdoor with Msfvenom

<b>What is TheFatRat ??</b> <br>An easy tool to generate backdoor with msfvenom (a part from metasploit framework) and easy tool to post exploitation attack …

Forensics

Simple Static Malware Analyzer: SSMA

SSMA is a simple malware analyzer written in Python 3.<p>Features:<p>Analyze PE file’s header and sections (number of sections, entropy of sections/PE …

Stitch – Python Remote Administration Tool AKA RAT

Stitch is a cross-platform Python Remote Administration Tool, commonly known as a RAT. This framework allows you to build custom payloads for …

Linux

HERCULES - A Special Payload Generator That Can Bypass Antivirus Softwares

HERCULES is a customizable payload generator that can bypass antivirus software. <b> <br>INSTALLATTION</b> <br>SUPPORTED PLATFORMS:<br>Operative systemVersionUbuntu16.04 …

Forensics

Single Chrome exploit can compromise any Android smartphone

A researcher at Quihoo 360 recently discovered an exploit in Chrome that can probably demolish even the newest, most up-to-date Android devices if the user visits an infected site.<p>The vulnerability was exposed at PacSec’s MobilePwn2Own event. What makes the exploit particularly unsettling is that …

Android News

Apple and Google 'FREAK attack' leaves millions of users vulnerable to hackers

Technology giants hurrying to fix a longstanding security flaw caused by US companies being forced to sell weakened encryption software to overseas customers<p>Millions of people may have been left vulnerable to hackers while surfing the web on Apple and Google devices, thanks to a newly discovered …

Information Security

47 Raspberry Pi Projects to Inspire Your Next Build

If you’re looking for inspiration for your first Raspberry Pi project, look no further than the several dozen projects entered in the first ever Raspberry Pi Design Contest, sponsored by MCM Electronics. All the projects were entered into one of four categories – Artistic, Educational, Enclosure, …

This Site Shows Who Is Hacking Whom Right Now — And The US Is Getting Hammered

U.S.-based computer security firm Norse has released a real-time animated map that illustrates ongoing cyberattacks around the world. Without a doubt, the U.S. is getting constantly hammered by hackers.<p>In just 45 minutes, the U.S. was the victim of 5,840 cyberattacks.<p>The Norse map does not …

Cybersecurity

JP Morgan Chase owns up to data breach: 465,000 customers at risk

JP Morgan Chase is the latest financial institution to own up to a data breach.<p>According to reports, the breach affected 2% of the customers of one …

Microsoft and partners fight back against the ZeroAccess botnet

Microsoft announced yesterday that its Digital Crimes Unit has successfully disrupted ZeroAccess, one of the world’s largest botnets.<p>Its action was …

iPhones are off limits to President Obama for “security reasons”

The powers that be won’t let US President Barack Obama use an iPhone because of security reasons, he told a group of young people while pitching his …

Inside a $2.3 million criminal exploit business

In October, Russian police announced they'd arrested the creator of the infamous "Blackhole" exploit kit, a readymade hacking tool that offered buyers an easy way to install web-based malware in exchange for $500 to $700 a month. Today, security writer Brian Krebs takes a closer look at the man …

Super Mario fully implemented in HTML5

Full Screen Mario is Josh Goldberg's complete remake of the classic Super Mario Brothers in HTML5. You can play re-creations of the original levels, …

NSA tracking hundreds of millions of mobile phone locations worldwide

Mobile phones broadcast their location even when they’re not being used to place a call or text and even when GPS is off, emitting signals sent to …

The FBI Can Activate Your Notebook Or Android Smartphone's Mic Remotely

<i>The Wall Street Journal</i> reports that the FBI employs a secret tactic in its quest to keep up to speed on suspects: a hacker-like feature that allows …

Hackers Attacked Microsoft Using Security Hole That Google Found

By Jim Finkle<p>BOSTON (Reuters) - Microsoft Corp said hackers have attacked some computers by exploiting a bug in Windows first disclosed two months ago by a Google Inc researcher, who came under fire at the time for publicizing the flaw without going to the software company first.<p>Microsoft provided …

Hackers in four-year effort to steal S.Korea military secrets

BOSTON — A mysterious group of computer hackers has spent four years spying on the South Korea military, U.S. security software maker McAfee said Monday, citing evidence uncovered from malicious software samples.<p>The findings, which were not confirmed by authorities in Seoul, provide one possible …

Cyber-attacks

Yes, the NSA contributed code to Android, but don't freak out about it

To call the avalanche of leaks triggered by Edward Snowden a scandal is an understatement. Not a week passes without an embarrassing disclosure, and the secretive National Security Agency is at the center of it all.<p>The NSA is allegedly snooping on the electronic communications of everyone from …

Surveillance