
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
DataWalker for Oracle is a data unloader and block examiner tool. It can be used by DBAs to recover data or by forensic examiners to look for evidence after a breach. Figure 1 – the DataWalker interface This document describes how to recover data from a given table. Recovering data ...
When a client, be it a user or a web application, connects to an Oracle database instance it first connects to the TNS Listener. The listener hands the client off to the database instance and logs the connection. The information logged by the listener about the connection contains, amongst other ...
Artemis is an advanced malware simulation suite capable of emulating the Advanced Persistent Threat. Artemis raises the bar allowing ethical hackers and penetration testers the luxury of an advanced set of features equivalent to many of the tools employed by criminal gangs today. By abstracting polymorphism to a server based ...
MITMer is a man-in-the-middle and phishing attack tool that steals the victim’s credentials of some web services like Facebook. Dependencies: python2 scapy python2-nfqueue How to: Run it as root. sudo python2 mitmer.py Select a network interface. After scanning the network for available hosts, choose one as a victim or enter ...
The Security Configuration Benchmark for Apple OS X 10.8, provides prescriptive guidance for establishing a secure configuration posture for Apple OSX 10.8. This guide was tested against Apple OSX 10.8 [button size=medium style=round color=red align=none url=http://benchmarks.cisecurity.org/downloads/show-single/index.cfm?file=osx108.100 ]Download [/button] Document submitted by Renee McLaughlin from cisecurity.org
Most of the companies nowadays have their firewalls, threat monitoring and prevention security appliances setup. With these mechanisms in place, security precautions are taken and incidents are monitored. Inbound traffic being restricted, SEES on the other hand is developed for sending targeted phishing emails in order to carry sophisticated social ...
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted.
NSDTool – Netgear Switch Discovery Tool is a toolset of scripts used for discovering of netgear switches in local networks. The tool consists of some extra features like bruteforce and setting a new password. Netgear has its own protocol called NSDP Netgear Switch Discovery Protocol, which is humbly implemented to ...
The selected tools for Rooted Warfare Tools Event First Edition of Rooted Con is released. An amazing lineup of weapons that ranges from Information gathering, Wireless hacking, malware analysis to web application assessment and security intelligence. Find below the accepted tools DRADIS FRAMEWORK Dradis is an open-source framework to enable ...