13 Feb 2018
Russian security officers have arrested several scientists working at a top-secret Russian nuclear warhead facility for allegedly mining crypto-currencies. Bitcoin fever has apparently spread to the highest levels of Russian defense. Several scientists working at top-secret Russian nuclear warhead facility have been arrested for mining Bitcoin while on the job. The scientists are being accused...
05 Feb 2018

Linux System Optimizer And Monitoring. Required Packages curl systemd Debian x64 Download stacer_1.0.8_amd64.deb from the Stacer releases page. Run sudo dpkg -i stacer*.deb on the downloaded package. Launch Stacer using the installed stacer command. Fedora x64 Download stacer_1.0.8_x64.rpm from the Stacer releases page. Run sudo rpm –install stacer*.rpm on the downloaded package. Launch Stacer using the installed stacer command. Build from source with CMake (Qt Version Qt 5.9) $…

26 Dec 2017

Download PDF http://35.224.153.49/wp-content/uploads/2018/02/powershell-cheat-sheet.pdf

20 Dec 2017
Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level. This solution, based on lightweight multi-platform agents, provides the following capabilities: Log management and analysis: Wazuh agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage. File integrity monitoring: Wazuh...
18 Dec 2017
InSpy is a python based LinkedIn enumeration tool. Inspy has two functionalities: TechSpy and EmpSpy. TechSpy - Crawls LinkedIn job listings for technlogoies used by the provided company. InSpy attempts to identify technologies by matching job descriptions to keywords from a new line delimited file. EmpSpy - Crawls LinkedIn for employees working at the provided company. InSpy...
12 Dec 2017
Quasar is a fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you. Features TCP network stream (IPv4 & IPv6 support) Fast network serialization (NetSerializer) Compressed (QuickLZ) & Encrypted (AES-128) communication Multi-Threaded UPnP Support No-Ip.com Support Visit Website (hidden &...
11 Dec 2017

Researcher Michael Myng found a deactivated keylogger in a piece of software found on over 460 HP laptop models. A full list of affected laptops is here. The keylogger is deactivated by default but could represent a privacy concern if an attacker has physical access to the computer. “Some time ago someone asked me if I can figure…

06 Dec 2017

The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it holds.Today most administrators and forensic analysts, the registry probably looks like the entrance to a dark. Besides Configuration information,  the Windows Registry holds information regarding recently accessed files and considerable information about user…

03 Dec 2017

Google has been caught collecting location data on every Android device owner since the beginning of this year (that’s for the past 11 months)—even when location services are entirely disabled, according to an investigation conducted by Quartz. This location-sharing practice doesn’t want your Android smartphone to use any app, or turn on location services, or even have…

28 Nov 2017
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. What You Will Learn: Find out to download and install your own copy of...