List of Raspberry Pi DIY Projects for Anonymity!

If you stay in California and want to protect your privacy, or you want to circumvent internet censorship imposed by your government or simply want to stay anonymous on the wire chances are you use use TOR or use a anonymous, no-log-keeping VPN. This post lists a few Do-It-Yourself projects that involves not more than a Raspberry Pi to try and keep you anonymous. As always I will try to keep this post updated. Additionally, if you know of any projects that I may have missed, you sure can let me know!

Raspberry Pi
Raspberry Pi

Continue reading “List of Raspberry Pi DIY Projects for Anonymity!”

Cameradar: Hack RTSP CCTV Cameras!

I stumbled upon this tool when trying to find more Docker security projects – Cameradar. You can use this tool post exploitation just for the fun, or use it in your own network and check for unauthorized CCTV installations. You can also use it to test the security of your existing camera setup.

Cameradar
Cameradar

Continue reading “Cameradar: Hack RTSP CCTV Cameras!”

[SHORT POST] PivotAll: A Comprehensive Pivoting Framework!

This is a short post about a cool PowerShell script – PivotAll that can help us a lot post exploitation. Why PowerShell? It is because, this shell and scripting language is already present on most modern Windows operating systems.

PivotAll
PivotAll

Continue reading “[SHORT POST] PivotAll: A Comprehensive Pivoting Framework!”

Snorter: A automatic Snort, Barnyard2, and PulledPork Installer!

All of us know about Snort, the open-source, free and lightweight network intrusion detection system (NIDS) software for Linux & Windows to detect emerging threats. Also, all of us know that if you want to install Snort, Barnyard2 & PulledPork on a lot of machines, it get’s a lot more time consuming and well monotonous. This is where Snorter comes in the picture.

Snorter
Snorter

Continue reading “Snorter: A automatic Snort, Barnyard2, and PulledPork Installer!”

Leviathan: An All In One Security Audit Toolkit!

Fresh off the GitHub repository – Leviathan, an open source, wide-range  security audit toolkit that helps you with service discovery, brute force, SQL injection detection and running custom exploit. One of the guys behind this project is Utku Sen. If you remember he was the one who wrote open source ransomware – EDA2 and Hidden Tear.

Leviathan
Leviathan

Continue reading “Leviathan: An All In One Security Audit Toolkit!”

UPDATE: Wifiphisher v1.3!

An older post describing Wifiphisher can be found here. Recently an update was made to the open source tool that helps you execute speedy and automated phishing attacks against wireless networks. Most notably, this new release includes the Lure10 attack – a novel way for associating automatically with any device that is within range running the latest Windows.

Wifiphisher
Wifiphisher

Continue reading “UPDATE: Wifiphisher v1.3!”

Kali Linux 2017.1: The Professional Penetration-Testing Distro!

Kali Linux really needs no introduction today. It is the de-facto open source, Debian-based operating system for penetration testing, vulnerability assessments, digital forensics and wireless assessments.  It is one of those operating systems that I see being actively developed and has a huge and helpful community. This post talks about the improvements and new tool additions in the latest open source Kali Linux 2017.1 Rolling release.

Kali Linux
Kali Linux

Continue reading “Kali Linux 2017.1: The Professional Penetration-Testing Distro!”