OSTrICa – Open Source Threat Intelligence Collector
OSTrICa stands for Open Source Threat Intelligence Collector and is an Open Source plugin-oriented framework to collect and visualize Threat Intelligence Information. Furthermore, OSTrICa is also the Italian word...
Open-Source Phishing Framework: gophish
Gophish is a phishing framework that makes the simulation of real-world phishing attacks dead-simple. The idea behind gophish is simple – make industry-grade phishing...
iOS Penetration Testing Lab Environment
Damn Vulnerable iOS App (DVIA) is an iOS application that is damn
vulnerable. Its main goal is to provide a platform to mobile security...
Top 10 Open Source Web Testing Tools
Web Testing tools are used to find/identify bugs or errors in a website before it was launched officially for the public on the web....
Open Source Browser-based P2P Encrypted Chat Service
If you are not think of becoming the President one day, if you are not involved in any illegal activity, if you do not...
Open Source Privacy Tools that Keeps you Safe from NSA
After the Gemalto security breach it is clear that Spy agencies like NSA use their Hackers to gain access to servers. Snowden documents showed...
Control a Remote Phone via Webserver – Android Security
An app that can record phones, sms, track location changes, silently take pictures etc. and watch all the fun beeing uploaded to a webconsole...
Detekt to Resist Government Surveillance
It
has been well documented that governments are using surveillance
technology to target human rights defenders, journalists, NGOs,
political opponents, religious or ethnic minorities and to conduct
countrywide...
Weevely PHP Stealth Web Backdoor Kali Linux
Weevely is a stealth PHP web shell that
simulate an SSH-like connection. It is an essential tool for web
application post exploitation, and can be used...
ZMap: Open-Source Network Scanner
Network scanning is the most important part of the information gathering process that a hacker penetration tester performs
at its very first step; the...
Google releases ‘nogotofail’ A Network Traffic Security Testing Tool
Google has released Nogotofail as an
open source project available on GitHub, meaning anyone can use it,
contribute new features, provide support for more platforms, and...
Source Code Analyzer for PHP Vulnerabilities – RIPS
The World Wide Web grew rapidly during the last decades and is used by millions of people every day for online shopping, banking, networking, and...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...