Database Hacking
Database contains mission critical data of the corporate firm, which makes it an obvious target by hackers.
Password guessing – Once the hacker gains control of web server, he looks for the application configuration files which typically contain the database server name...
Hello guys,
These are comprehensive list of IP, Browser and devices checkers
Pixelscan
Cover Your Tracks (top checker)
AmIUnique (also top)
Free IP Address Lookup & Proxy Detection Test | IP Address Details | Proxy IP Check (will check your IP quality)
Downloads | AIDA64 (a program which...
As you can read, sweeper just clear your browsers like cookies, history, cache etc.
1. Installation
Code:
sudo apt install sweeper
2. Start Sweeper
Code:
sweeper / sudo sweeper
3. Overview
If you opened sweeper successfully then you can see a tab of "Privacy Settings", here you can choose...
The method is suitable for absolutely any iOS device (absolutely any version).
What is the essence of the blocking bypass method?
The method consists in spoofing the Apple iCloud DNS addresses.
STEP 1
We choose absolutely any, there is no difference.
STEP 2
If Wi-Fi is already connected...
Two-factor authentication (2FA) has long been known for the security it can bring to organizations and their customers. The combination of what you know, what you have, and what you are is the heart and soul of 2FA and helps explain ITS relative reliability.
Even so, attackers are known to have...
In addition to simply changing the voice in IP telephony applications (Skype, AIM, Yahoo, MSN, GoogleTalk, TeamSpeak, etc.), this program can use audio effects that will add variety to Your background environment. For example, use the effect of a noisy shopping center or traffic jam - your...
1. SORM - official wiretapping
The most obvious way is official wiretapping by the state.
In many parts of the world, telephone companies are required to provide access to wiretapping lines for the competent authorities. For example, in Russia, in practice, this is done technically through SORM...
Phpvuln - Audit Tool To Find Common Vulnerabilities In PHP Source Code
phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process of finding common PHP vulnerabilities in PHP code, i.e. command injection, local/remote file inclusion and...
WSuspicious
Summary
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this blog post: WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day | GoSecure It was inspired from the WSuspect proxy project...
The US authorities reported hacking of cloud corporate accounts due to employees ' failure to comply with the requirements of cyber hygiene.
The US Cybersecurity and Infrastructure Security Agency (CISA) has reported a series of successful cyber attacks on a number of cloud services.
According...
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.
Description
This tool can help you in your OSINT investigation on Proton service (for educational purposes only).
ProtOSINT is separated in 3 sub-modules:
[1] Test the validity of one...
sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.
Resources
Usage
Installation
From Binary
From source
From github
Post Installtion
Contribution
Usage
To display help message for sigurls use the -h flag:
$...
MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com).
Legal Disclaimer:
Usage of MaskPhish for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws...
Browser Blocker for Windows blocks common browsers from accessing the internet on Windows.
To block just run the batch as admin (Right click > Run as administrator) and select the browser.
Download:
Download Browser Blocker for Windows rar
Download Browser Blocker for Windows rar