How to Become a Black Hat Arsenal Master
March 9th, 2016 | by MaxiSoler
From the perspective of a Black Hat Arsenal speaker Michael Boelen give us the chance to know what to expect and [&hellipMarch 9th, 2016 | by MaxiSoler
From the perspective of a Black Hat Arsenal speaker Michael Boelen give us the chance to know what to expect and [&hellipMarch 19th, 2012 | by NJ Ouchn
Javvad Malik is a well-seasoned information security consultant with well over a decades worth of experience in working with some [&hellipMarch 19th, 2012 | by NJ Ouchn
pastemon is a tool to monitor pastebin.com content for relevant information. Based on regular expressions, events are generated. Those can [&hellipMarch 19th, 2012 | by NJ Ouchn
Windbgshark is an open source network debugging tool, designed to assist in reverse engineering of unknown protocols, traffic manipulation and [&hellipMarch 19th, 2012 | by NJ Ouchn
Citrix ICA is a complex multi-layered protocol which uses multiplexed frames, compression and encryption over a single TCP connection. Rather [&hellipMarch 19th, 2012 | by NJ Ouchn
The tools exploit xpath injection vulnerability in web applications and support advanced exploitation features. Both Xpath 1.0 and 2.0 are [&hellipMarch 19th, 2012 | by NJ Ouchn
Didier has released several free open source tools to help with the analysis of (malicious) PDF files. These tools are [&hellipMarch 19th, 2012 | by NJ Ouchn
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful [&hellipMarch 19th, 2012 | by NJ Ouchn
What is Seccubus? Seccubus automates regular vulnerability scans and provides delta reporting. The goal is to reduce the analysis time [&hellipMarch 19th, 2012 | by NJ Ouchn
cvedetails.com is a security vulnerability database website, which collects data from multiple sources and provide some unique features like statistics, [&hellip