XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation
Introduction When Web application Penetration Tester start to scan web site using vulnerability scanners it give him false positive vulnerabilities and that happen because a lot of scanners using the...
View ArticleTiny banker aka Tinba Source
Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware. Tinba is a combination of the words tiny and...
View ArticleFibratus – tracing the Windows Kernel
Fibratus is a tool which is able to capture the most of the Windows kernel activity – process/thread creation and termination, file system I/O, registry, network activity, DLL loading/unloading and...
View ArticleTelsaCrypt Decryption Tool v1.0
TESLACRYPT DECRYPTION TOOL Talos has created a decryption program to help individuals whose data has been encrypted by the TeslaCrypt ransomware. TeslaCrypt is a rapidly growing ransomware strain that...
View ArticleoclHashcat+ Advanced GPU Hash Cracking Utility 0.15
OclHashcat+ is an advanced GPU hash cracking utility that includes the World’s fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses...
View ArticleSparty 0.1
Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize...
View ArticleMobius Forensic Toolkit
Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined...
View ArticleTiny banker aka Tinba
Tiny banker malware, aka Tinba. Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware. Tinba is a...
View ArticleFrankenscript 3.2
FrankenScript, is a script built to enhance wi-fi network auditing within Kali Linux on WEP and WPA/2 secured network access points, freeing the user from the process of creating elaborated command...
View ArticleUnveiling the mask V1.0
Unveiling the mask V1.0, pdf write up and analysis by Kaspersky Labs. Excerpt from the writeup: The Mask is an advanced threat actor that has been involved in cyber-espionage operations since at least...
View Article