If you stay in California and want to protect your privacy, or you want to circumvent internet censorship imposed by your government or simply want to stay anonymous on the wire chances are you use use TOR or use a anonymous, no-log-keeping VPN. This post lists a few Do-It-Yourself projects that involves not more than a Raspberry Pi to try and keep you anonymous. As always I will try to keep this post updated. Additionally, if you know of any projects that I may have missed, you sure can let me know!
I stumbled upon this tool when trying to find more Docker security projects – Cameradar. You can use this tool post exploitation just for the fun, or use it in your own network and check for unauthorized CCTV installations. You can also use it to test the security of your existing camera setup.
This is a short post about a cool PowerShell script – PivotAll that can help us a lot post exploitation. Why PowerShell? It is because, this shell and scripting language is already present on most modern Windows operating systems.
All of us know about Snort, the open-source, free and lightweight network intrusion detection system (NIDS) software for Linux & Windows to detect emerging threats. Also, all of us know that if you want to install Snort, Barnyard2 & PulledPork on a lot of machines, it get’s a lot more time consuming and well monotonous. This is where Snorter comes in the picture.
Fresh off the GitHub repository – Leviathan, an open source, wide-range security audit toolkit that helps you with service discovery, brute force, SQL injection detection and running custom exploit. One of the guys behind this project is Utku Sen. If you remember he was the one who wrote open source ransomware – EDA2 and Hidden Tear.
An older post describing Wifiphisher can be found here. Recently an update was made to the open source tool that helps you execute speedy and automated phishing attacks against wireless networks. Most notably, this new release includes the Lure10 attack – a novel way for associating automatically with any device that is within range running the latest Windows.
Kali Linux really needs no introduction today. It is the de-facto open source, Debian-based operating system for penetration testing, vulnerability assessments, digital forensics and wireless assessments. It is one of those operating systems that I see being actively developed and has a huge and helpful community. This post talks about the improvements and new tool additions in the latest open source Kali Linux 2017.1 Rolling release.