ssh-mitm is an intercepting (mitm) proxy server for security audits. Redirect/mirror Shell to another ssh client supported in 0.2.8 Replace …
NSA warns against using DoH inside enterprise networks
Image: ZDNet The US National Security Agency has published today a guide on the benefits and risks of encrypted DNS …
Pineapple-MK7-REST-Client – WiFi Hacking Workflow With Pineapple Mark 7 API
PINEAPPLE MK7 REST CLIENT The leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active …
Umbrella_android – Digital And Physical Security Advice App
Umbrella is an Android mobile app developed by Security First that provides human rights defenders with the information on what …
Iranian cyberspies behind major Christmas SMS spear-phishing campaign
Image: Rodion Kutsaev An Iranian cyber-espionage group known as Charming Kitten (APT35 or Phosphorus) has used the recent winter holiday break to …
ProtOSINT – A Python Script That Helps You Investigate Protonmail Accounts And ProtonVPN IP Addresses
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses. Description This tool can help …
Google reveals sophisticated Windows and Android hacking operation
Image: Google Project Zero Google published a six-part report today detailing a sophisticated hacking operation that the company detected in …
Ubiquiti tells customers to change passwords after security breach
Image: Ubiquiti Networks Networking equipment and IoT device vendor Ubiquiti Networks has sent out today notification emails to its customers …
pongoOS – A Pre-Boot Execution Environment For Apple Boards
A pre-boot execution environment for Apple boards built on top of checkra1n. Building on macOS Install Xcode + command-line utilities …
MUD-Visualizer – A Tool To Visualize MUD Files
This tool can be used to visualize the MUD files in JSON format. Motivation MUD files are plain text files …