-
Sep 22, 2016
Discovery, auditing…and some vulnerability checks Developed by Scott Sutherland, PowerUpSQL is a powershell module intended to be used during internal penetration tests, that perform discovery, inventory, auditing for common weak configurations, and privilege escalation checks on scale on SQLServer. From… read more »
-
Sep 21, 2016
With a lot of modules and a good CLI interface Cartero is a phishing framework with a full featured CLI interface with a modular structure divided into commands that perform independent tasks (i.e. Mailer, Cloner, Listener, AdminConsole, etc…). Each sub-command… read more »
-
Sep 20, 2016
Xiaomi, what are you doing? The security researcher Thijs Broenink has reversed the app AnaliticsCore, that comes preinstalled on his Xiaomi Mi4, and found that this app checks for a new update from the company’s official server every 24 hours. With… read more »
-
Sep 19, 2016
Mechanical Bird! Cuckoo Sandbox is a famous Open Source software for automating analysis of suspicious files. CuckooDroid is an extension that brings to Cuckoo the capabilities of execution and analysis of android applications. Developed by Idan Revivo and Ofer Caspi,… read more »
-
Sep 16, 2016
200 volts DC power on the USB port? Cool! Last year,a Russian researcher named Dark Purple has designed a proof-of-concept USB prototype able to destroy sensitive components of a computer when plugged in. Now, a Hong Kong-based technology manufacturer has actually… read more »
-
Sep 15, 2016
A video lesson focused on one of the most complex passages of the Etude #1 by Heitor Villa-Lobos A nice lesson of Gohar Vardanyan, about the study and practice of difficult passages. The video is focused on the execution of… read more »
-
Sep 14, 2016
With great power comes great responsibility! PunkSPIDER it’s an extremely powerful tool, the results of which should be used with extreme care and awareness And the developers has the same opinion: when you enter the site in fact you are… read more »
-
Sep 13, 2016
Oracle, are you there? We need you! Dawid Golunski, a Polish security researcher discovered several security issues in the MySQL DBMS, including a vulnerability flaw (CVE-2016–6662) that can be exploited by a remote attacker to inject malicious settings into my.cnf configuration… read more »