Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Parmin Tukidi
shellcode for execve penetration test.

shellcode for execve penetration test.

August 25, 2016
Parmin Tukidi
Exploits, Penetration Test

shellcode for execve penetration test. Main Program: 1. exec /bin/sh with shellcode. 2. call sys_exit with shellcode. Dependencies: + Gcc on Gnu/Linux + gdb exec…

Read Article →
Infestor - A cryptoanalysis on the malware Petya.

Infestor – A cryptoanalysis on the malware Petya.

May 11, 2016
Parmin Tukidi
Anti Malware/Virus - Malware Analysis, Articles, Code Scripting, Cryptography, Encryption

Petya is a relatively new crypt-ransomware that has been spreading in recent months (March – April 2016). When the user executes the PETYA .exe, the…

Read Article →
gef updates - Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.

gef updates – Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.

April 5, 2016
Parmin Tukidi
Exploits, Security Tools

Roadmap and  changelog 5/4/2016: + gef.py : heap: added sub-command arenas (issue #22) — heap – added new sub-command fastbins + docs: added gef save/restore…

Read Article →
Eli.Decode is a tool to decode obfuscated shellcodes using the unicorn engine.

Eli.Decode is a tool to decode obfuscated shellcodes using the unicorn engine.

March 30, 2016
Parmin Tukidi
Security Tools

Eli.Decode is a tool to decode obfuscated shellcodes using the unicorn engine. Please note + You may have problems or wrong decoded shellcodes… + You…

Read Article →
ranger v0.43b - A tool to support security professionals to access and interact with remote Microsoft Windows based systems.

ranger v0.43b – A tool to support security professionals to access and interact with remote Microsoft Windows based systems.

February 25, 2016
Parmin Tukidi
Networking, Penetration Test, Scanner

Latest Change v0.43b (25/2/2016): + ranger.py: — WMIEXEC Metasploit web_delivery Memory Injector. — ATEXEC Metasploit web_delivery Memory Injector. — Create Pasteable web_delivery Attack. A tool…

Read Article →
SecurityLab is a collection Program vulnerabilities, OpenSSL, and web app attacks.

SecurityLab is a collection Program vulnerabilities, OpenSSL, and web app attacks.

January 23, 2016
Parmin Tukidi
Encryption, Exploits, Penetration Test

NOTE: This Post For Education and Security Research Only. SecurityLab is a collection Program vulnerabilities, OpenSSL, and web app attacks. —Explaination— Lab1: sploit1 The vulnerability…

Read Article →
BufferAttack is an Various Methods of Buffer Attacks.

BufferAttack is an Various Methods of Buffer Attacks.

January 10, 2016
Parmin Tukidi
Exploits, Penetration Test

BufferAttack is an Various Methods of Buffer Attacks, plus implementation of preventive technique using sandboxing. File lists: – hello – hello.c – hello3.c – helloc.dis…

Read Article →
netool.sh version 4.6 codename 'Single_byte_XOR' released : MitM PENTESTING OPENSOURCE T00LKIT.

netool.sh version 4.6 codename ‘Single_byte_XOR’ released : MitM PENTESTING OPENSOURCE T00LKIT.

November 29, 2015
Parmin Tukidi
Exploits, Framework, Networking, Penetration Test, Phishing

Changelog v-4.6: The toolkit was named of ‘Single_byte_XOR’ because this version it focous in obfuscating payloads with the inclusion of Shellter PE injector and diferent…

Read Article →
1 2 3 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools