289
Using Metadata to find Paul Revere
I have been asked by my superiors to give a brief demonstration of the surprising effectiveness of even the simplest techniques of the new-fangled Social Networke Analysis in the pursuit of those who would seek to undermine the liberty enjoyed by His Majesty’s subjects.
metadata  privacy  analysis  research  2013 
11 weeks ago
ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way.
malware  samples  infosec 
november 2018
Hack The Box :: Penetration Testing Labs
An online platform to test and advance your skills in penetration testing and cyber security. Join today and start training in our online labs.
challenges  ctf  infosec  wargames  learning 
october 2018
kali linux - Can not see partitions in gparted after imaging iso
I have imaged 64Gb usb stick with kali linux iso as explained in official documentation. Then I have created persistence partition with parted in accordance with official docs as well. But even after doing this gparted shows the whole drive with no partitions.
howtos  linux  kali  filesystems  liveusb  questions  2017  bootdisks 
april 2018
Proxmark/proxmark3: Proxmark 3
The proxmark3 is a powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags.

This repository contains enough software, logic (for the FPGA), and design documentation for the hardware that you could, at least in theory, do something useful with a proxmark3.
rfid  infosec  firmware  software  proxmark3  pentesting 
march 2018
Proxmark/proxmark3 Wiki
This is the home page of a group of volunteer enthusiasts committed to further enhancing the capabilities of the already awesome Proxmark3, originally developed by Jonathan Westhues and release under the terms of GPL.
wikis  howtos  manuals  proxmark3  pentesting  rfid  infosec 
march 2018
Lab401 - EU RFID & Pentesting Experts
Lab401 is a Europe-based provider of specialised RFID Tools: Proxmark 3, Chameleon Mini, Magic Mifare Cards, and specialised hardware: USB Killer, PandwaRF, etc
proxmark3  infosec  rfid  keyloggers  pentesting  webshops 
march 2018
Community: Cheat Sheets & Posters
SANS Computer Forensics Training Community: discover computer forensic tools and techniques for e-Discovery, investigation and incident response.
malware  favs  incidentresponse  analysis  forensics  reversing  cheatsheets  threatintel  infosec 
march 2018
How to create an ESXi usb installer on Mac OS X
A couple of days ago I wanted to test VMware ESXi 5.5 on a Mac Pro 4,1 (quad-core XEON 2.66GHz / 8GB RAM). I had a couple of issues doing this, mostly my fault as, of course, I jumped straight in and didn’t read any of the documentations. Anyway, once I had read the documentation there were still a few things not covered, so I thought I would document the steps I took to get the platform installed.
vmware  howtos  esxi  2013  liveusb  macos  bootdisks 
january 2018
Objective-See Tools
Free OS X Security Tools (KnockKnock, TaskExplorer, BlockBlock, RansomWhere?, OverSight, Lockdown, KextViewr, ...).
macos  software  lists  hardening 
january 2018
The Apple Toolchain
The following is a list of common tools used to manage Apple devices. Do you use something that isn’t on this list? Comment it and I’ll try and add it! In order to remain vendor agnostic I am trying to list solutions in alphabetical order by category.
2017  macos  software  lists 
january 2018
Multiple Versions of Python on Windows
The official solution for coexistence is the Python Launcher for Windows, talked about in PEP 397, which was included in Python 3.3.0. The documentation on this is sometimes tricky to wade through so I want to present what I hope is a simplified view here.
windows  python  programming  2014  howtos 
october 2017
Daily Dave Mailing List
Seclists archive for the Daily Dave mailing list: This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.
disclosures  infosec  vulnerabilities  exploits  mailinglists 
june 2017
gentilkiwi/mimikatz Wiki
mimikatz is a tool I've made to learn C and make somes experiments with Windows security.

It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket, build Golden tickets, play with certificates or private keys, vault, ... maybe make coffee?
wikis  manuals  hashes  windows  pentesting  passwords  mimikatz  passthehash  infosec 
june 2017
A Penetration Testing Site | pentestmonkey
Penetration testing tools, user enumeration tools, reverse shells, web shells, cheat sheets, SQLi, ...
cheatsheets  enumeration  reverseshells  infosec  sqli  pentesting 
june 2017
FuzzySecurity
FuzzySecurity's tutorials, scripting, exploits, and interesting links/videos.
analysis  learning  privesc  favs  exploits  infosec  rfid  malware  programming  howtos  courses  pentesting 
june 2017
WiGLE: Wireless Network Mapping
Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
api  wireless  wardriving  maps  networking  onlinetools 
june 2017
Botnet Tracker
Here you can view maps which display the geographical distribution of malware infection and time-series graphs of online and new bots (for fun there is a live map which will display a blip every time an infected computer pings one of my tracking servers).
botnets  infosec  trackers  malware 
june 2017
10 best Linux distros for privacy fiends and security buffs in 2017 | TechRadar
We look at the best privacy keeping and penetration testing Linux distros that are available.
distros  linux  lists  privacy  pentesting  2017  infosec 
june 2017
AlessandroZ/BeRoot: Privilege Escalation Project - Windows / Linux / Mac
BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.
It has been added to the pupy project as a post exploitation module (so it will be executed in memory without touching the disk).
beroot  infosec  vulnerabilities  windows  pentesting  software  privesc 
june 2017
A Red Teamer's guide to pivoting
Pivoting guide for penetrations testers or red team members
2017  infosec  pivoting  pentesting  howtos 
june 2017
Creating Metasploit Payloads
Often one of the most useful (and to the beginner underrated) abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module and it helps something that can give you a shell in almost any situation
metasploit  infosec  pentesting  howtos 
june 2017
urlscan.io - Scan your website
urlscan.io allows you to scan a website and analyze the resources it requests and the domains it contacts. Understand what your website is doing.
scanners  infosec  analysis  urltools  onlinetools 
june 2017
The Search API — Twitter Developers
The Twitter Search API is part of Twitter’s REST API. It allows queries against the indices of recent or popular Tweets and behaves similarly to, but not exactly like the Search feature available in Twitter mobile or web clients, such as Twitter.com search. The Twitter Search API searches against a sampling of recent Tweets published in the past 7 days.
api  twitter  search 
june 2017
Troy Hunt: Here's how I verify data breaches
I'd like to focus on how I verify data breaches and ensure that when reporters cover them, they report accurately and in a way that doesn't perpetuate FUD. Here's how I verify data breaches.
infosec  databreaches  2016  howtos 
june 2017
Technical Note TN2449: OpenSSH updates in macOS 10.12.2
macOS 10.12.2 includes version 7.3p1 of OpenSSH. This technote documents some ssh behavior changes over previous macOS versions introduced in this update.
ssh  macos  authentication  networking  keychain  howtos 
june 2017
Guerrilla Mail
Guerrilla Mail. Disposable temporary e-mail address. Avoid spam and stay safe. Use a disposable email address!
email  mailbox  disposable  onlinetools 
march 2017
Mailinator
Mailinator is free, public, email system where you can use any inbox you want!
email  mailbox  disposable  onlinetools 
march 2017
OSBoxes - Virtual Machines for VirtualBox & VMware
Homepage of site that offers virtual machines (VDI & VMDK & VHD) for VirtualBox and VMware. Run VMs inside VirtualBox and VMware on any host.
virtualbox  vmimages  vmware 
february 2017
SpamCop.net - Blocking List ( bl.spamcop.net )
Beware of cheap imitations! SpamCop has been protecting the internet community since 1998. Automatically file spam reports with the network administrators who can stop unsolicited email at the source. Subscribe, and filter your email before it reaches your inbox.
email  blacklists  infosec  spam 
february 2017
The Spamhaus Project - Blocklist Removal Center
If your IP address is listed on one of our IP blocklists; SBL, XBL or PBL (collectively known as the 'Zen' blocklist) or your Domain is listed on the Spamhaus Domain Blocklist (DBL), this lookup tool will tell you and will give you a link to information on what to do.
blacklists  email  infosec  spam 
february 2017
Penetration Testing and Exploit Dev Cheat Sheet
SPIKE fuzzer, ASM, Reverse Shells, ASCII table, Manual XOR encoder/decoder, get all shellcode on binary file from objdump, Python struct(), SCAPY, PE Header, Nmap - additional flags, GDB - basic commands, Netcat Listeners, Basic CLI one-liners, PEDA - basic commands, Scapes NtAccessCheck (AndAuditAlarm) Egghunter, SSH Tunneling.
cheatsheets  infosec  programming  pentesting  exploits 
february 2017
Malware Domain List
An up to date list of domains that direct users to, or host, malicious software.
infosec  blacklists  malware 
february 2017
DNS-BH – Malware Domain Blocklist
The DNS-BH project creates and maintains a listing of domains that are known to be used to propagate malware and spyware. This project creates the Bind and Windows zone files required to serve fake replies to localhost for any requests to these, thus preventing many spyware installs and reporting.
infosec  blacklists  malware 
february 2017
Suspicious Domains - SANS Internet Storm Center
There are many suspicious domains on the internet. In an effort to identify them, as well as false positives, we have assembled weighted lists based on tracking and malware lists from different sources. ISC is collecting and categorizing various lists associated with a certain level of sensitivity.
infosec  blacklists  malware 
february 2017
PhishTank | Join the fight against phishing
PhishTank is a collaborative clearing house for data and information about phishing on the Internet. Also, PhishTank provides an open API for developers and researchers to integrate anti-phishing data into their applications at no charge.
infosec  phishing  api 
february 2017
SSL Client Test - SSL/TLS Capabilities of Your Browser
The SSL client test shows the SSL/TLS capabilities of your browser.
tls  infosec  vulnerabilities  ssl  analysis  pentesting  onlinetools  scanners 
february 2017
ZeuS Tracker
The abuse.ch ZeuS Tracker help you to track ZeuS hosts and generating a IP-blocklist or domain-blocklist
botnets  blacklists  infosec  trackers  malware 
february 2017
Packet Total
PacketTotal is a free, online PCAP analyzer designed to visualize network traffic, detect malware, and provide analytics for the traffic contained within.
infosec  malware  samples  pcaps  analysis  onlinetools  favs  scanners 
february 2017
Malc0de Database
An updated database of domains hosting malicious executables
blacklists  infosec  samples  malware 
february 2017
Microsoft Malware Protection Center's malware encyclopedia
Learn how to protect your PC from virus and malware attacks by researching and reviewing malware descriptions.
infosec  microsoft  analysis  malware 
february 2017
BuiltWith Technology Lookup
Web technology information profiler tool. Find out what a website is built with.
scanners  infosec  analysis  webapps  pentesting  onlinetools 
february 2017
Have I been pwned?
Have I been pwned? allows you to search across multiple data breaches to see if your email addresses or accounts have been compromised.
api  email  infosec  databreaches  favs 
february 2017
U.S. HHS - OCR - Data Breaches
As required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches.
healthcare  infosec  databreaches  usa 
february 2017
DuckDuckGo
DuckDuckGo is the search engine that doesn't track you. We protect your search history from everyone – even us!
api  privacy  duckduckgo  onlinetools  search 
february 2017
DuckDuckGo: regex cheat sheet
duckduckgo instant answer regex cheatsheet. Provides a cheatsheet for common regular expression syntax.
regex  cheatsheets 
february 2017
ThreatExpert - Automated Threat Analysis
ThreatExpert is an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.
onlinetools  scanners  infosec  analysis  malware 
february 2017
PunkSPIDER
Welcome to PunkSPIDER, a global web application vulnerability search engine.
infosec  vulnerabilities  analysis  onlinetools  pentesting  webapps  scanners 
february 2017
#totalhash | Malware Analysis Database
#totalhash provides static and dynamic analysis of Malware samples. The data available on this site is free for non commercial use. If you have samples that you would like analyzed you may upload them to our anonymous FTP server.
api  scanners  infosec  analysis  malware  onlinetools 
february 2017
Network Tools From MxToolBox
All of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool. Input a domain name or IP Address or Host Name.
dns  iptools  favs  analysis  onlinetools  email  reputation  blacklists  infosec 
february 2017
SenderBase lookup
SenderBase - The world's largest Email and Web traffic monitoring network.
spam  onlinetools  email  analysis  reputation  blacklists  infosec 
february 2017
URLCrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
dns  favs  typosquatting  pentesting  phishing  software  urlcrazy  infosec 
february 2017
elceef/dnstwist: Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
See what sort of trouble users can get in trying to type your domain name. Find similar-looking domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud and corporate espionage. Useful as an additional source of targeted threat intelligence.
dns  favs  typosquatting  pentesting  dnstwist  software  phishing  infosec 
february 2017
Zscaler Zulu URL Risk Analyzer
Zulu is a dynamic risk scoring engine for web based content. For a given URL, Zulu will retrieve the content and apply a variety of checks in three different categories: Content Checks, URL Checks, and Host Checks
onlinetools  scanners  infosec  analysis  urltools  malware 
february 2017
CryptoWall tracker
This tracker focusses on tracking the development changes in the CryptoWall ransomware, it does not attempt to track every single CryptoWall sample that exists. It simply exists to track the family in a more higher level fashion, a few samples will be listed next to specific versions just for reference rather than bulk collection.
trackers  infosec  analysis  ransomware  malware 
february 2017
Ransomware Tracker
Ransomware Tracker by abuse.ch. Tracking Ransomware Infrastructure around the globe
blacklists  ransomware  infosec  trackers  malware  botnets 
february 2017
SSL Blacklist
The SSL Blacklist (SSLBL) is a collection of SHA1 fingerprints of malicious SSL certificates that are being used by specific botnet C&C channels to control infected computers
infosec  malware  ssl  certificates  reputation  blacklists  botnets 
february 2017
Cymon - Open Threat Intelligence
Cymon is the largest tracker of open-source security reports about phishing, malware, botnets and other malicious activities. Search for IP addresses or domains in our reputation database.
favs  api  analysis  onlinetools  tips  threatintel  infosec 
february 2017
Threat Crowd
ThreatCrowd is a system for finding and researching artefacts relating to cyber threats.
favs  api  onlinetools  analysis  tips  threatintel  infosec 
february 2017
Reason Core Security Labs - Authenticode Reputation
Please enter a valid search in the form of a hash (MD5, SHA-1, SHA-256), a domain, host (example.com), URL, an IP Address, or the full signer name (publisher/organization) from an Authenticode signature.
microsoft  codesigning  favs  analysis  authenticode  onlinetools  reputation  infosec 
february 2017
Well-known security identifiers in Windows operating systems
Lists well-known security identifiers in Windows operating systems. Also lists additional built-in groups that are created when a domain controller is added to the domain.
windows  infosec  microsoft  sids 
february 2017
hashC - Online Guaranteed Decrypter Cracker
hashC is an online premium service that offers guaranteed hash cracking. We can crack all hash-types (+160) using multi attack-modes (MD5, SHA1, WPA, WPA2, vBulletin, Wordpress, MySQL, MS Office, BTC/LTC wallet, ..and much more)
hashes  passwords  infosec  crackers  pentesting  onlinetools 
february 2017
HashKiller - SHA1 Decrypter
HashKiller.co.uk - Over 312.072 billion cracked SHA1 hashes. Your free online SHA1 decryption and encryption website - SHA1 Decrypter
hashes  crackers  onlinetools  passwords  pentesting  sha1  infosec 
february 2017
HashKiller - MD5 Decrypter
HashKiller.co.uk - Over 829.726 billion cracked MD5 hashes. Your free online MD5 decryption and encryption website - MD5 Decrypter
hashes  crackers  md5  onlinetools  pentesting  passwords  infosec 
february 2017
HashKiller - NTLM Decrypter
HashKiller.co.uk - Over 312.072 billion cracked NTLM hashes. Your free online LM / NTLM decryption and encryption website - NTLM Decrypter.
hashes  crackers  pentesting  onlinetools  passwords  ntlm  infosec 
february 2017
Find IP Address geolocation
Find IP address location - Enter an IP address to search its geolocation. Detect city, state, country + more.
maps  onlinetools  geolocation 
february 2017
urlquery.net - Free URL scanner
urlQuery.net is a service for scanning URLs and detecting web-based malware. Providing detailed information about the browsers activity while visiting an site.
urltools  infosec  malware  favs  analysis  onlinetools  scanners 
february 2017
How to disable shutdown/reboot/suspend/hibernate?
How to disable the Suspend and Hibernate entries in the LightDM power indicator.
howtos  2012  linux  powermanagement  questions  lightdm 
february 2017
How to change the hibernate and suspend settings at a system-wide level in Xfce?
Commands to remove the suspend and hibernate buttons from the Xfce logout dialog (for the user, not system-wide).
howtos  2013  linux  powermanagement  questions  xfce 
february 2017
Base64 Image Encoder
Optimize your images and convert them to base64 online. Drag & Drop your files, copy to clipboard with a click and use the result in HTML and CSS.
onlinetools  base64  images  encoders 
february 2017
WPScan Vulnerability Database
The WPScan Vulnerability Database is an online browsable version of WPScan's data files which are used to detect known WordPress core, plugin and theme vulnerabilities. This database has been compiled by the WPScan Team and various other contributors since WPScan's release.
api  vulnerabilities  wordpress  infosec 
february 2017
GetProtected // App Gallery
Governments & mainstream apps are invading your privacy. Privacy is a basic human right. Take back your privacy with these secure, privacy-first apps and services.
privacy  software  lists  encryption 
february 2017
Reverse Engineer a Verisure Wireless Alarm part 2 – Firmwares and crypto keys
We’ll learn how to extract and dig into firmwares. Getting firmware out of the memory will actually help us to grab various AES keys, a required step to decrypt both radio and ethernet communications, but also authenticating against the local console using USB connector.
encryption  verisure  reversing  firmware  2014  howtos 
january 2017
Reverse Engineer a Verisure Wireless Alarm part 1 – Radio Communications
This post is the first part of my Verisure story and aims to observe radio communications between the multiple devices of the alarm. In other words, we will translate the radio communication into binary messages.
verisure  2014  reversing  sdr  projects  howtos 
january 2017
Objective-See Mac Malware Samples
The following archive contains malicious OS X software! By downloading the samples, anyone waives all rights to claim punitive, incidental and consequential damages resulting from mishandling or self-infection ;)
macos  samples  infosec  malware 
january 2017
Nexpose - Vulnerability management software
Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.
scanners  vulnerabilities  software  infosec  pentesting  nexpose 
january 2017
w3af - Open Source Web Application Security Scanner
w3af is a Web Application Attack and Audit Framework. The project's goal is to create a framework to find and exploit web application vulnerabilities that
scanners  w3af  vulnerabilities  pentesting  software  webapps  infosec 
january 2017
« earlier      
0x20 2006 2009 2010 2011 2012 2013 2014 2015 2016 2017 2fa analysis ansible antibody antigen api aptgroups arachni arduino armory authentication authenticode automation awesome backups base64 batteries beef belgium beroot bitcoin blackhat blacklists books bootdisks botnets brucon brussels c9000 calculators camping carbonblack cbapi cbfeeds ccc censys certificates challenges chargers cheatsheets checksums cleanup clonezilla cloudstorage code codesigning commandline conferences courses crackers cryptocurrencies css ctf cuckoosandbox cve cybercampaigns databases databreaches debuggers decoders defcon deobfuscators disassemblers disclosures displays disposable distros diy dmcrypt dns dnstwist duckduckgo email encoders encryption enpass enumeration esxi exploits faqs favs fde filesystems filevault firewalls firmware forensics forums frameworks freenas fri3dcamp geolocation germany ghdb ghent git gnupg hackers hackerspaces handson hardening hashcat hashes hdparm headers healthcare hids homebrew homebrewbundle homebrewcask homelabs honeypots howtos hsbxl html http ids images imessage incidentresponse infosec ios iot iphone ips iptools javascript kali keychain keyloggers konboot lanturtle lastpass learning lightdm linux lists livecd liveusb luks lvm macos magazines maha mailbox mailinglists makers malware manuals maps matelight md5 metadata metasploit microsoft mikrotik mimikatz monitoring nas nerdlab netherlands networking nexpose nids nikto nips nmap ntlm oneliners onlinetools openpgp openvas openvpn osint ossec owasp pam passthehash passwords pastebin pastemon pcaps pentesting phishing phrack pivoting pocorgtfo powermanagement presentations privacy privesc programming projects proxmark3 pwntools pxe pystemon python questions radare rankings ransomware raspberrypi ratdecoders regex reputation research reverseshells reversing rfid routeros routers rubberducky samples scanners schedules sdr search seccubus set sha1 sha2017 shells sherlock shodan sids snort socialengineering software spam spideroakone sqli sqlmap ssd ssh ssl storage subreddits suricata switches swos sync synology sysinternals tcpdump threatactors threatintel timelab tips tls tor trackers tresorit twitter typosquatting u2f ubuntu uk urlcrazy urltools usa utf8 vcs verisure videos virtualbox vlans vmimages vmware vpn vulnerabilities w3af wallets wardriving wargames webapps webbrowsers webservers webshops wifipineapple wikis windows wireless wordpress writeups xfce yara yubikey yumi zeroknowledge zplug zsh

Copy this bookmark:



description:


tags: