Author: Steve West

ExchangeRelayX – OWA for hackers

This instrument provides the attacker having an OWA looking interface, using the user’s contacts and mailbox. Features Raw XML accessibility to the EWS host, so you can send requests to features and functions that Weren’t pre-programmed in exchangeRelayx…

Read More »

Detect Evil Maid Attacks: Do Not Disturb

Among the most effective ways to undermine a computer is with physical accessibility. A lot of people have probably left our notebooks unattended (possibly in a hotel room when traveling?). It would be wonderful to know if someone…

Read More »

Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

  BLACKEYE is an update from the first shellfish instrument by the Linux choice under GNU license. BLACKEYE is the most complete Phishing Tool, using 32 templates +1 customizable and it functions just on LAN. Blackeye Usage git…

Read More »

Rick To Inject Commands On Root Terminal-Rootstealer

  Rootstealer is an example of a new attack using X11. This instrument is used to detect if Linux users start the terminal with root and inject control with X11 lib. Rootstealer Installation # apt-get install libX11-dev libxtst-dev…

Read More »

Microsoft Research Detours Package

  Detours have been utilized by several ISVs and are also used by product groups at Microsoft. Detours are now available under a typical open source license (MIT). This simplifies licensing for programmers using Detours and enables the…

Read More »

Ring 0 Army Knife -r0ak

Motivation The Windows kernel is a rich environment where countless drivers execute on a normal system, and in which thousands of factors containing global state are present. For advanced troubleshooting, IT specialists will typically utilize tools like the…

Read More »

A POC HTTP Botnet Project Of UBoat

UBoat HTTP is a POC HTTP Botnet made to replicate a full weaponized commercial botnet. UBoat Uses Coded in C++ with no dependencies Encrypted C&C Communications Persistence to Stop your control being lost Link Redundancy (Uses a fallback…

Read More »

Security Competition of Infrastructure Automation Framework -Laforge

Laforge enables rapid development of infrastructure for the purpose of information security competitions. Using a simple and intuitive configuration speech, Laforge oversees a dependency graph and state management and allows for highly productive remote collaboration. The Laforge engine…

Read More »

Writing Style Matters For Your Blog ? – And How To Improve Yours

[ad_1] In 2018, it would appear that everyone has their own blog. Actually, Grandma has got one! However, why is it that you want one, particularly if you currently have a super rough life? For many, blogging is…

Read More »

Easy Methods To Build A Sustainable Freelance Writing Business While Traveling The World

[ad_1] Nowadays, if I told you that it really is possible to get your dream job and use it to fund a never-ending experience across the world, do you think me? Before, the idea of the’digital nomad’ lifestyle…

Read More »