21 de agosto de 2019

goDoH – A DNS-over-HTTPS C2

godoh is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. Currently supported providers include Google, Cloudflare but also contains the...

Static Analysis Tool For Android/iOS Apps Focusing On Security Issues Outside The Source Code

A static analysis tool for Android and iOS applications focusing on security issues outside the source code such as resource strings, third party libraries and configuration files.RequirementsPython 3 is...

What’s Happening In Forensics – Aug 19, 2019

Monday, August 19, 2019 (18:56:49) What's Happening In Forensics - Aug 19, 2019 Posted by: scar ...

Huawei Device Support In Oxygen Forensic Detective

Monday, August 19, 2019 (15:15:59) Huawei Device Support In Oxygen Forensic DetectiveOxygen Forensic Detective offers various methods of data extraction from...

pwnedOrNot v1.2.6 – OSINT Tool to Find Passwords for Compromised Email Addresses

OSINT Tool to Find Passwords for Compromised Email Accounts pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps.FeaturedGet In TouchChangelogFeatureshaveibeenpwned offers a...

Interview With Nicole Odom, Forensic Scientist, Virginia DFS

Monday, August 19, 2019 (09:30:03) Interview With Nicole Odom, Forensic Scientist, Virginia DFSNicole, you started out in chemistry and biological sciences...

Convolutional Neural Network For Analyzing Pentest Screenshots

Give those screenshots of yours a quick eyeballing. Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of web-based hosts. Go...

“Can I Take Over XYZ?”

What is a subdomain takeover? Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows...

Dow Jones Hammer – Protect The Cloud With The Power Of The cloud(AWS)

Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS resources, across all regions and accounts. It has...

Firmware Slap – Discovering Vulnerabilities In Firmware Through Concolic Analysis And Function Clustering

Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap is built as a series of libraries and exports most information as...