Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Axon

Pages: 1 [2] 3 4 ... 35
Operating System / PentestBox
« on: June 11, 2015, 05:45:23 pm »
PentestBox is a Portable Penetration Testing Distribution for Windows Environments

Demo video

Security Tools / CMSmap
« on: May 16, 2015, 01:07:27 pm »
CMSmap is a python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs. The main purpose of CMSmap is to integrate common vulnerabilities for different types of CMSs in a single tool. At the moment, CMSs supported by CMSmap are WordPress, Joomla and Drupal.

Found it on the Webs / Malware analysis engine and repository
« on: May 08, 2015, 02:13:14 pm »
AVCaesar is a malware analysis engine and repository, developed by within the FP7 project CockpitCI.
AVCaesar can be used to:
- Perform an efficient malware analysis of suspicious files based on the results of a set of antivirus        solutions, bundled together to reach the highest possible probability to detect potential malware;
- Search for malware samples in a progressively increasing malware repository.

Security Tools / Rekall Memory Forensic Framework
« on: May 08, 2015, 02:01:18 pm »
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.

Security Tools / FuckShitUp
« on: May 02, 2015, 03:28:04 pm »
Basically, FSU is bunch of tools written in PHP-CLI. Using build-in functions, you are able to grab url's using search engines - and so, dork for interesting files and full path disclosures. Using list of url's, scanner will look for Cross Site Scripting, Remote File Inclusion, SQL Injection and Local File Inclusion vulnerabilities. It is able to perform mass bruteforce attacks for specific range of hosts, or bruteforce ssh with specific username taken from FPD. Whenever something interesting will be found, like vulnerability or broken auth credentials, data will be saved in .txt files - just like url's, and any other files. FSU is based on PHP and text files.

Articles / Yahoo tests ear-based smartphone identification system
« on: April 29, 2015, 07:45:38 pm »
Yahoo is working on a way of unlocking a mobile phone using the owner's ear rather than a password or fingerprint.
It is also looking to use fists or even the way people grip their smartphone as alternative forms of biometric authentication. Fingerprint scanners on mobile phones are increasingly popular, but expensive.

Yahoo is looking to use the phone's touchscreen as the image sensor, which would be far cheaper. The system, developed at Yahoo Labs, is dubbed Bodyprint and has had initial trials with 12 participants.
"Due to their cost, capacitive fingerprint scanners have been limited to top-of-the-line phones, a result of the required resolution and quality of the sensor," the team said on its website.

Niltalk lets you create instant, password protected chat rooms without the need to signup. Simply click the "Create" button, and share the unique chat URL with your peers.

All communication happens over SSL. Niltalk doesn't record or log IP addresses, messages, or peer handles anywhere. Once a room is created, it has a lifetime of 120 minutes before the first login. Then, the room is automatically deleted after 10 minutes of inactivity (no messages exchanged). While in a room, you or any of your peers can dispose of the room with the click of a button.

GitHub page:

Security Tools / LFiFreak
« on: April 04, 2015, 02:31:36 pm »
LFiFreak is a unique tool for exploiting local file inclusions using PHP Input, PHP Filter and Data URI methods.

-Works with Windows, Linux and OS X
-Includes bind and reverse shell for both Windows and Linux
-Written in Python 2.7

Found it on the Webs / SecureDrop: Open source whistleblower platform
« on: April 04, 2015, 01:48:39 pm »

SecureDrop is an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.


GitHub page:

Operating System / Freepto: Encrypted GNU/Linux on USB
« on: March 31, 2015, 11:20:17 pm »
Freepto is a Linux-based operating system on USB stick preconfigured for security and encryption. Data you save on the USB stick will always automatically be encrypted. The idea behind Freepto is to offer an easy way to deal with the most common needs of activists, without giving up the convenience of a traditional operating system.

Articles / Wave-Particle Duality, Visible at Last
« on: March 13, 2015, 08:03:25 pm »
Ever since Louis de Broglie proposed the wave nature of matter in the 1920s, countless physics students have tried to picture wave-particle duality. Thanks to modern electron microscopy techniques, scientists based in Switzerland have captured the first image of light exhibiting both properties simultaneously.

New evidence by Kaspersky researchers suggests that the hacking group could be NSA personnel in disguise.

It was almost after 2 years since the Snowden leaks that Russian firm Kaspersky Lab’s Global Research and Analysis Team presented a report last month where it clearly showed that NSA i.e. National Security Agency is the major suspect in global hacking campaign which attacks the firmware of the hard drives. The action of this hacking group was termed as “Equation Group” by Kaspersky due to the advanced methods used by the hackers to carry out its actions.

The new report which Kaspersky’s researchers published on Wednesday shows that the term “BACKSNARF” was one of the terms which was used by the Equation Group in one of their codes in their online platform and on the other hand NSA’s cyber warfare unit was using the same term for one of its project.

The report

Security Tools / Hyperfox
« on: March 11, 2015, 11:13:20 pm »
Hyperfox is a security tool for proxying and recording HTTP and HTTPs communications on a LAN. Hyperfox is capable of forging SSL certificates on the fly using a root CA certificate and its corresponding key (both provided by the user). If the target machine recognizes the root CA as trusted, then HTTPs traffic can be succesfully intercepted and recorded. Hyperfox saves captured data to a SQLite database for later inspection and also provides a web interface for watching live traffic and downloading wire formatted messages.

I've reading heavily on the situation of the Ukrainian crises, and the US intervention in this crises which has a far reaching goals, that most of us are oblivious to.
This is the video, since the original one requires age verification

The big picture is clear. This coup was instigated and supported by US to overthrow the democratically elected pro-russian president, and install a NATO friendly anti Russian president.

But, why the US is doing all this mayhem and chaos, the following link is the most important. It doesn't only explain why US is starting this war, but takes the reader back to the first WW to explain a similarity between both events.

We can see now the main goal of the US administration which is complete world domination, militarily and financially.

Found it on the Webs / Android Security Wiki
« on: March 04, 2015, 05:26:24 pm »
One link for android security resources.

Pages: 1 [2] 3 4 ... 35

Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.