Free online instant mailer with attachments, encryption, HTML editor and advanced settings.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Topics - Axon
This tutorial should give the reader a better understanding about the PE file format and how some malwares use obfuscation techniques to hide their payloads.
Available online with a malware sample here
CrunchPwn is a penetration testing repository/addition for CrunchBang Linux, it can be installed on top of existing environment or downloaded as an ISO.
Just another Pentest distro. Just how many of them out there
« on: February 22, 2014, 08:09:28 pm »
Just found this interesting, I'm no expert in php shells, I though this might be interesting for some of you folks out there. Are people still using c99 and r57 shells?
Here is a list of security tools that have been collected from the internet. These tools are specifically aimed toward security professionals and enthusiasts/hobbyists for testing and demonstrating security weaknesses.
« on: February 17, 2014, 06:56:20 pm »
So it turns out that Cyanogemod’s built in updater gets it’s update information by contacting http://download.cyanogemod.org/api
Note the http:// part there. It also turns out there’s no signature verification of the flashable .zip file that the custom recovery uses to update. What this means is that anyone who can MITM your connection (Which means the NSA to anyone who can manipulate the BGP routing table all the way down to anyone who can own your router/has access to your local LAN/WLAN) can change where the cyanogenmod update looks for the image file that CM will flash.
« on: February 15, 2014, 07:36:36 pm »
A quarter of Americans surveyed could not correctly answer that the Earth revolves around the sun and not the other way around, according to a report out Friday from the National Science Foundation. The survey of 2,200 people in the United States was conducted by the NSF in 2012 and released on Friday at an annual meeting of the
« on: February 13, 2014, 12:41:29 am »
Two scientists have formalized a theorem regarding the existence of God penned by mathematician Kurt Gödel. But the God angle is somewhat of a red herring -- the real step forward is the example it sets of how computers can make scientific progress simpler.
« on: February 06, 2014, 11:28:29 pm »
During an audit of the Android ADB source code, two security issues within the Android SDK Platform Tools were discoverd. When combined together, these issues can allow an unprivileged local user to gain access to the account of someone that uses the ADB tool.
This is DARPA Open Catalog, which contains a curated list of DARPA-sponsored software and peer-reviewed publications. The DARPA Open Catalog organizes publically releasable material from DARPA programs.
The android IMSI catcher detector is an android based project to detect and (hopefully one day) avoid fake base stations (IMSI-Catchers) in GSM/UMTS Networks.
With IMSI-Catchers being exponentially popular lately, and with an explosion of various "bastards" with governments and criminals all the same, using it. Anyone can now buy an IMSI-Catcher (or build a cheap one on his own). In addition they can all crack the A5.1-3 encryption on the fly!.
Project size is around 85mb, it contains papers and ebooks about GSM protocols and related subjects, some papers are in German.
wifijammer is a python tool used to continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block's range with heavy access point saturation
The GSM Security Map website compares the protection capabilities of mobile networks from different countries worldwide. Networks are rated in their protection capabilities relative to a reference network that implements all protection measures that have been seen “in the wild”.
Does anyone know any software (preferably open source) for numbers pattern recognition? I'm looking for a software where the user inputs a set of numbers, then the software will do a pattern recognition, after that the software will generate numbers based on the patterns.
« on: January 23, 2014, 05:13:06 pm »
Publication Date: December 18, 2013
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained.