Close



DigitalMunition logo
  • HOME
  • POPULAR POST
    • ARCHIVES
      • Pentest Tools
      • Hacking News
      • security
      • Cyber Attack | Data Breach
      • Vulnerabilties
      • Malware
      • Privacy
      • Cryptography
      • Papers
      • Security-Distro
      • Exploit
      • Infographic
      • Featured
      • Forensics
      • OSINT
      • Gadget
      • Videos
      • Technology
    • TAG CLOUD
  • ACTIVITY
  • FORUM GROUP
    • LATEST TOPICS
    • MEMBERS
      • Subscriptions
      • Topics Started
      • Replies Created
      • Favorites
  • CONTACT
    • ADVERTISE
  • ⓘINFO
    • PRIVACY & POLICY
    • TERMS & CONDITIONS
    • DISCLAIMER
  • SEARCH →


Pentest Tools

gcat

Gcat – A stealthy Backdoor that uses Gmail as a command and control server

June 18th, 2015 📆 | 7178 Views ⚑

A stealthy Python based backdoor that uses Gmail as a command and control server. Setup For this to work you

Tagged with: backdoor • command • control • gmail • server • stealthy




Vulnerabilties

security-vulnerability-720x360-695x336

Flaw in mobile app data could put billions of records at risk

June 18th, 2015 📆 | 8111 Views ⚑

Billions of records could be in danger due to flaw in mobile app data The manner in which thousands of

Tagged with: billions • could • mobile • records




Pentest Tools

VBS-Obfuscator

VBS-Obfuscator – VBScript obfuscation to allow PenTesters bypass countermeasures

June 18th, 2015 📆 | 3184 Views ⚑

VBScript obfuscation to allow PenTesters bypass countermeasures. Sample Script Output C:\tools>python obfuscator.py test.vbs out.vbs Char 109 -> 5505-5396 Char 115

Tagged with: allow • bypass • obfuscation • obfuscator • pentesters • vbscript




Videos

Commix - Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

June 18th, 2015 📆 | 2959 Views ⚑

This video is all about Commix the Command Injection tool. We will use this tool on PentesterLab ISO on Command

Tagged with: automated • command • commix • exploitation • injection




Videos

Python for Automating OSINT #4 - The Requests Module

Python for Automating OSINT #4 – The Requests Module

June 17th, 2015 📆 | 6437 Views ⚑

Learn to use the magical requests module to grab news articles from Google News. 2015-06-17 21:09:04 source

Tagged with: automating • module • osint • python • requests




Videos

SQL injection attack mechanics | Pluralsight

SQL injection attack mechanics | Pluralsight

June 17th, 2015 📆 | 3243 Views ⚑

SQL injection attack mechanics | For many years now, SQL injection has been classified as the #1 risk on the

Tagged with: attack • injection • mechanics • pluralsight




Videos

How PH is defending against cyber attacks

How PH is defending against cyber attacks

June 17th, 2015 📆 | 7430 Views ⚑

Based on a recent study conducted by an international cyber security firm, agents of one country have been hacking into

Tagged with: against • attacks • cyber • defending




Videos

Real examples of hacking and malware attacks then what Microsoft did to stop them

Real examples of hacking and malware attacks then what Microsoft did to stop them

June 17th, 2015 📆 | 4624 Views ⚑

On this week’s show, we catch up again with Mark Russinovich to explain the how security components in cloud services

Tagged with: attacks • examples • hacking • malware • microsoft




Videos

Why The Govt. Personnel Cyberattack Was Way Worse Than You Think & Could Cost American Lives

Why The Govt. Personnel Cyberattack Was Way Worse Than You Think & Could Cost American Lives

June 17th, 2015 📆 | 3593 Views ⚑

Steve Green highlights the horribleness of the recent cyberattack on the government office of personnel. Its dangerous scope will hurt

Tagged with: american • could • cyberattack • lives • personnel • think • worse




Videos

Ebay Inc Magento Bug Bounty Program 2015 - Cross Site Request Forgery Vulnerability (Messages)

Ebay Inc Magento Bug Bounty Program 2015 – Cross Site Request Forgery Vulnerability (Messages)

June 17th, 2015 📆 | 6475 Views ⚑

Hacker Bug Bounties – Ebay Inc Magento Bug Bounty Program 2015 – Cross Site Request Forgery Vulnerability (Messages) @bugbounty #bugbounty

Tagged with: bounty • cross • forgery • magento • program • request • vulnerability




Pentest Tools

wave-1000x563

Pyxiewps — Wireless Attack Tool

June 17th, 2015 📆 | 5284 Views ⚑

Pyxiewps is a wireless attack tool writen in python that uses reaver, pixiewps, macchanger and aircrack to retrieve the WPS

Tagged with: attack • pyxiewps • wireless




Pentest Tools

cupp

Cupp – Common User Passwords Profiler

June 17th, 2015 📆 | 1726 Views ⚑

The most common form of authentication is the combination of a username and a password or passphrase. If both match

Tagged with: common • passwords • profiler




Hacking News

pic24-640x400

Android Users Targeted by Sberbank Mobile Banking Trojan

June 17th, 2015 📆 | 4767 Views ⚑

Security researchers are warning Android users to be wary of a trojan being distributed by third-party app stores and file-sharing

Tagged with: android • banking • mobile • sberbank • targeted • users




Videos

What You Missed: Oversight Hearing on OPM Data Breach

What You Missed: Oversight Hearing on OPM Data Breach

June 17th, 2015 📆 | 4155 Views ⚑

Members questioned government officials about two Office of Personnel Management data breaches that may have affected as many as 14

Tagged with: breach • hearing • missed • oversight




Videos

House hearing on OPM data breach

House hearing on OPM data breach

June 16th, 2015 📆 | 6613 Views ⚑

The House Committee on Oversight and Government Reform meets to discuss the massive OPM data breach. 2015-06-16 19:35:13 source

Tagged with: breach • hearing • house




Videos

OPM Data Breach with Ranking Member Elijah Cummings

OPM Data Breach with Ranking Member Elijah Cummings

June 16th, 2015 📆 | 5929 Views ⚑

Ranking Member Elijah E. Cummings’ Opening Statement for the Committee on Oversight and Government Reform’s June 16th Hearing on the

Tagged with: breach • cummings • elijah • member • ranking




Videos

NTFS Forensics and the Master File Table

NTFS Forensics and the Master File Table

June 16th, 2015 📆 | 4648 Views ⚑

2015-06-16 19:06:36 source

Tagged with: forensics • master • table




Videos

House Oversight Hearing on OPM Data Breach

House Oversight Hearing on OPM Data Breach

June 16th, 2015 📆 | 6603 Views ⚑

The House Oversight and Government Reform Committee holds a hearing on an Office of Personnel Management data breach announced earlier

Tagged with: breach • hearing • house • oversight




Videos

Chairman Chaffetz - IG Warned for Years - OPM Data Breach

Chairman Chaffetz – IG Warned for Years – OPM Data Breach

June 16th, 2015 📆 | 5146 Views ⚑

Learn more at http://Oversight.House.Gov 2015-06-16 16:10:50 source

Tagged with: breach • chaffetz • chairman • warned • years




Videos

Chairman Chaffetz Opening - OPM Data Breach

Chairman Chaffetz Opening – OPM Data Breach

June 16th, 2015 📆 | 8328 Views ⚑

Learn more at http://Oversight.House.Gov 2015-06-16 14:29:26 source

Tagged with: breach • chaffetz • chairman • opening




Hacking News

lastpass-error-page

Password site ​LastPass warns of data breach

June 16th, 2015 📆 | 3284 Views ⚑

Even LastPass, a cloud-based password security site, isn’t immune to data breaches. The company’s chief executive Joe Siegrist said in

Tagged with: breach • lastpass • password • warns




Hacking News

ios-flaw-695x336

Apple iOS flaw can be exploited to steal user id and password with a phishing email

June 16th, 2015 📆 | 2638 Views ⚑

Vulnerability in Apple iOS system allows hackers to steal userid and password with a phishing email A demonstration by a

Tagged with: apple • email • exploited • password • phishing • steal




Pentest Tools

Coruton

Crouton – Chromium OS Universal Chroot Environment

June 16th, 2015 📆 | 2546 Views ⚑

crouton is a set of scripts that bundle up into an easy-to-use, Chromium OS-centric chroot generator. Currently Ubuntu and Debian

Tagged with: chromium • chroot • crouton • environment • universal




Pentest Tools

running_icmpsh_slave_on_target

icmpsh – Simple Reverse ICMP Shell

June 16th, 2015 📆 | 7782 Views ⚑

Sometimes, network administrators make the penetration tester’s life harder. Some of them do use firewalls for what they are meant

Tagged with: icmpsh • reverse • shell • simple







«‹26422643264426452646›»





  • Your Account

    Register
  • Email Subscription

    Enter your email address:

    Delivered by FeedBurner



  • Donate
  • Popular

    • Cybersecurity firm Palo Alto Networks hit by employee data breachCybersecurity firm Palo Alto Networks hit by… November 28, 2019 Palo Alto Networks, the cybersecurity firm with a market cap…
    • Now even the FBI is warning about your smart TV’s security – TechCrunchNow even the FBI is warning about your smart TV’s… December 2, 2019 If you just bought a smart TV on Black Friday…
    • This Microsoft Phishing Attack Bypasses Security By Local Login FormThis Microsoft Phishing Attack Bypasses Security By… December 9, 2019 Microsoft users once again face threats from a new phishing…
    • Lazarus Hacking Group Strikes Again with Fileless MalwareLazarus Hacking Group Strikes Again with Fileless Malware December 9, 2019 Researchers discovered a new kind of “Fileless Malware” distributed by…
    • Utilities Targeted in Cyberattacks IdentifiedUtilities Targeted in Cyberattacks Identified November 24, 2019 More than a dozen U.S. utilities that were targets in…
    • Target sues Chubb in connection with 2013 data breachTarget sues Chubb in connection with 2013 data breach November 18, 2019 Target Corp. filed suit against Chubb Corp. in federal district…
    • Kali Linux 2019.4 includes new undercover mode for pentesters doing work in public placesKali Linux 2019.4 includes new undercover mode for… November 27, 2019 Offensive Security, maintainers of the popular Kali Linux open source…

    Comments

    • iwillmurder on Opinions on Cisco Netacad?
    • GhoastTypist on Opinions on Cisco Netacad?
    • IUsedToBeACave on Opinions on Cisco Netacad?
    • InfosecMod on Wi-Fi hardware packet sniffer
    • felddy on Live now: Watch the 2019 President’s Cup hacking finals (Dec 12th 0745-1600 EST)
    • heypokeGL on Nulled.to is gone
    • Arbi619 on Nulled.to is gone
    • xalaz69 on Nulled.to is gone
    • jeremyrem on Nulled.to is gone
    • SassyScript on Nulled.to is gone
    • ntoskernel on Nulled.to is gone
    • heypokeGL on Nulled.to is gone
    • skekHak on Nulled.to is gone
    • missile56 on Nulled.to is gone
    • DrinkMoreCodeMore on Nulled.to is gone
    • misconfig_exe on is it possible to get a remote job as pentester without certifications ?
    • smegblender on Weird things in this shellcode ?
    • IUsedToBeACave on Am I being too paranoid
  • Social Media

    DigitalMunition



    Tweets by @maher275
  • loading...
  • Now Trending Topics

    • How to crack "unprotected" wifi that takes you to a username/password screen
    • Finding password hashes in OSx
    • Port Forwarding
    • AOL security breach affects a significant number of users
    • Assistance using Tor's Hammer
    • A spammer is using my email address
    • lwppgcxb
    • How do proxys work and which is best?
    • 5 alarming things that can be undeleted from your phone using police software
    • Help me with the MSF Payload
  • Tag Cloud

    attack bounty breach computer cross cyber cybersecurity database escalation exploit google hackers hacking information injection linux malware memory network privilege scripting security vulnerability
  • Categories

    • Cryptography
    • Cyber Attack | Data Breach
    • disassembly
    • Exploit
    • Featured
    • Forensics
    • Gadget
    • Hacking News
    • Infographic
    • Malware
    • OSINT
    • Papers
    • Pentest Tools
    • Privacy
    • Proxy
    • security
    • Security-Distro
    • Technology
    • Videos
    • Vulnerabilties

footer logo

we are all about Ethical Hacking, Penetration Testing & Computer Security. We share and comment on interesting infosec related news, tools and more. Follow us on RSS ,Facebook or Twitter for the latest updates. DigitalMunition is designed to help Auditors, Pentesters & Security Experts to keep their ethical hacking oriented toolbox up-to-date .
This website is made for educational and ethical testing purposes only。It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this website.

Your Account

Register

Recent Topics

  • Opinions on Cisco Netacad?
  • Wi-Fi hardware packet sniffer
  • Live now: Watch the 2019 President’s Cup hacking finals (Dec 12th 0745-1600 EST)
  • Nulled.to is gone
  • Best portable mini wireless b/g/n/ac 5ghz usb wifi dongle 2019
  • Playing with file extensions in Windows. How to make “.exe” look like “.txt”
December 2019
S M T W T F S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  

Archives



© DigitalMunition  Privacy Policy Disclaimer  T&C

  • HOME
  • FORUM GROUP
  • ACTIVITY
  • POPULAR POST
  • CONTACT
  • ADVERTISE


Back to Top ↑