Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Axon

Pages: 1 ... 3 4 [5] 6 7 ... 30
Spy agencies in Germany, France, Spain and Sweden are carrying out mass surveillance of online and phone traffic in collaboration with Britain, according to documents leaked by Edward Snowden, the Guardian newspaper reported Saturday

The Guardian article

Security Tools / ARPwner
« on: November 03, 2013, 06:23:09 am »
ARPwner is a tool for ARP poisoning and DNS poisoning attacks, with a simple GUI and a plugin system to do filtering of the information gathered, also has a implementation of sslstrip and is coded 100% in python.

Code: [Select]

Articles / NSA spied on 124.8 billion phone calls in just one month
« on: October 28, 2013, 09:50:02 pm »
Oh dear god  :o .

The National Security Agency monitored nearly 125 billion phone calls in just one month, according to a number of new reports. And while the majority of calls reportedly originated in the Middle East, an estimated 3 billion of the calls originated in the U.S. According to a collection of the reports and leaked classified government files, the monitored calls took place throughout the month of January 2013 and tallied to 124.8 billion.

eBooks / Hacking Raspberry Pi
« on: October 24, 2013, 08:54:23 pm »

Publication Date: October 30, 2013
EPUB version


Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful hardware hacking techniques as you build incredibly creative and useful projects! This complete, full-color guide requires absolutely no experience with either hardware hacking or computer programming. Colorful photos guide you through each project, and the step-by-step instructions are stunningly clear and easy!

Found it on the Webs / FotoForensics
« on: October 22, 2013, 02:36:18 pm »
FotoForensics is a free web site intended to provide budding researchers a sample of what can be done with digital photo forensics.

Code: [Select]

Articles / Snowden: 'I have data on EVERY NSA operation against China'
« on: October 19, 2013, 06:20:34 pm »
18th October 2013
NSA whistleblower Edward Snowden has claimed he taught a course in “cyber-counterintelligence” against China and has access to data on every active operation mounted against the People’s Republic by the US spy agency.

Security Tools / JSDetox
« on: October 10, 2013, 03:23:40 pm »
JSDetox is a javascript malware analysis tool using static analysis / deobfuscation techniques and an execution engine featuring HTML DOM emulation

Found it on the Webs / XBMC
« on: October 08, 2013, 10:49:55 pm »
XBMC is an award-winning free and open source (GPL) software media player and entertainment hub that can be installed on Linux, OSX, Windows, iOS, and Android, featuring a 10-foot user interface for use with televisions and remote controls. It allows users to play and view most videos, music, podcasts, and other digital media files from local and network storage media and the internet.

Code: [Select]

Security Tools / w3af
« on: October 07, 2013, 01:18:48 am »
w3af, is a Web Application Attack and Audit Framework. The w3af core and it's plugins are fully written in python. The project has more than 130 plugins, which check for SQL injection, cross site scripting (xss), local and remote file inclusion and much more.

Code: [Select]

Found it on the Webs / winPenPack
« on: October 06, 2013, 01:19:46 pm »
winPenPack is a project that aims at collecting the most frequently used and most popular open source applications made portable, so that they can be executed without installation from any USB Flash Drive or Hard Disk. The winPenPack suites offer a wide range of portable applications like office tools, internet tools, multimedia tools, development tools, security applications and other frequently used utilities. Everything you need, completely free, open source and portable!.

Code: [Select]

Security Tools / Browzar
« on: October 03, 2013, 07:38:13 am »
Browzar is a light extremist Internet navigator who allows to surf the Web in complete safety. Similar to other navigators, Browzar uses the motor of Internet Explorer in most cases while adding several options of securities (software spies, window untimely).The feature of Browzar is that it never leaves traces in the temporary files containing review and cookies. Just after your disconnection the navigator will erase very instantly, no trace will be found on the used PC.

Code: [Select]

Found it on the Webs / Open source tools
« on: October 03, 2013, 07:28:22 am »
A site for Open Source or Free network and server management, security, monitoring and administration software and information.

Code: [Select]

Hacking and Security / Sniffing computers on remote routers.
« on: October 02, 2013, 09:55:37 am »
Let's get down to the core. At my work place, we have several institutes in a single building, each institute has its own corridor, some institutes may have more than one corridor, one for offices and the other for laboratories. However, the point here is that every corridor has its own routers where employees connect to (wired), which in return connect them to the main server. Now, is there a method at my disposal where I can sniff the computers connected to a different router given that I already know the IP address of that router?.

I know this question might seem trivial to some of you, I'm just worried about the level of security implemented on the routers. Therefore, I'm asking for some guidance,not spoon feeding.

Furthermore, keep in mind that I'm looking for a way to sniff the data sent from a remote router to the main server, I'm not interested in gaining access to the computers themselves.


Found it on the Webs / bWAPP
« on: September 28, 2013, 05:31:10 pm »
bWAPP, or a buggy web application, is a free and open source web application build to allow security enthusiasts, students and developers to better secure web applications. bWAPP prepares to conduct successful penetration testing and ethical hacking projects. It includes all vulnerabilities from the OWASP Top 10 project.

Code: [Select]

Pages: 1 ... 3 4 [5] 6 7 ... 30

Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Bluechill or Kulverstukas on the forum or at IRC.