Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Dmitry   /   Page 6
Python Script will automatically do the list fetching & testing proxys for you.

Python Script will automatically do the list fetching & testing proxys for you.

November 27, 2016
Dmitry
Internet Security

Simple Python script for fetching “some” (usable) proxies. It fetches list of public proxies (from here) and automatically finds in a quick manner those usable…

Read Article →
LightBulb is an open source python framework for auditing web applications firewalls.

LightBulb is an open source python framework for auditing web applications firewalls.

November 13, 2016
Dmitry
Firewall, Framework

LightBulb is an open source python framework for auditing web applications firewalls. The framework consists of two main algorithms: * GOFA: An active learning algorithm…

Read Article →
vlany is a LD_PRELOAD rootkit for x86_64, i686 and ARM architectures.

vlany is a LD_PRELOAD rootkit for x86_64, i686 and ARM architectures.

November 7, 2016
Dmitry
Encryption, Exploits, Networking

NOTICE: THIS POST JUST FOR EDUCATION & RESEARCH PURPOSE ONLY! YOU CAN LEARN HOW TO rootkit takes control of the system. vlany is a LD_PRELOAD…

Read Article →
CHIPSEC v1.2.5 - Platform Security Assessment Framework.

CHIPSEC v1.2.5 – Platform Security Assessment Framework.

November 5, 2016
Dmitry
Digital Forensics, Framework, Security Tools

CHIPSEC is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and the configuration of platform components. It includes a…

Read Article →
LinDrop - a social engineering vector for linux targets.

LinDrop – a social engineering vector for linux targets.

October 26, 2016
Dmitry
Code Scripting, Penetration Test

Disclaimer: All scripts/tools/software here are provided for educational purposes only. The author of any of the scripts/tools/software is in no way responsible for any misuse…

Read Article →
myBFF - a Brute Force Framework.

myBFF – a Brute Force Framework.

October 19, 2016
Dmitry
Brute Force, Framework

Point the framework at a file containing usernames, a host, and give it a password. The framework will determine what type of web application is…

Read Article →
Tools Updates : a Collection security and hacking tools; likes exploits, proof of concepts, shellcodes, scripts, and more.

Tools Updates : a Collection security and hacking tools; likes exploits, proof of concepts, shellcodes, scripts, and more.

October 8, 2016
Dmitry
Automation, Code Scripting, Cryptography, Encryption, Exploits, Networking, Penetration Test, Scanner

Changelog v9/10/2016: + Scanner: Automated HTTP Enumeration v0.4 *New + Exploit: add freepbx exploit + Misc: Breakout Atari 2600 Homebrew (PAL only). This section offers…

Read Article →
Concierge - A collection (eventually) of Physical Access Control and Monitoring attacks and utilities.

Concierge – A collection (eventually) of Physical Access Control and Monitoring attacks and utilities.

September 27, 2016
Dmitry
Code Scripting, Exploits, Network Mapping/Scanner

Concierge is A collection (eventually) of Physical Access Control and Monitoring attacks and utilities. These will all eventually evolve into a more effective and user…

Read Article →
← Previous 1 … 5 6 7 8 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools