HackDig : Dig high-quality web security articles for hacker

Hackers use hackers spreading tainted hacking tools in long-running campaign

Who is hacking the hackers? Experts from Cybereason a mysterious hackers group is targeting other hackers by spreading tainted hacking tools. Experts from security firm Cybereason warn of a mysterious group of hackers that are distributing trojanized hacking tools on an almost daily basis for the past years. These hacking tools are used by fellow hack
Publish At:2020-03-10 12:40 | Read:234 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Hackers hacking tools info

NSA Exploit EternalBlue is becoming even common in hacking tools and malware

Security Experts are observing a significant increase in the number of malware and hacking tools leveraging the ETERNALBLUE NSA exploit. ETERNALBLUE is the alleged NSA exploit that made the headlines with DOUBLEPULSAR in the WannaCry attack. ETERNALBLUE targets the SMBv1 protocol and is has become widely adopted in the community of malware developers. Invest
Publish At:2017-06-04 02:20 | Read:3695 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime ETERNAL

Shadow Brokers launched a crowdfunding campaign to raise 10,000 bitcoins

The group calling itself The Shadow Brokers who hacked the NSA-linked Equation Group announced the launch of a crowdfunding campaign for the stolen arsenal. This summer the hacker group Shadow Brokers hacked the NSA-linked group known as the Equation Group and leaked 300 Mb of hacking tools, exploits, and implants. The Shadow Brokers launched an all-pay auct
Publish At:2016-10-18 19:15 | Read:4568 | Comments:0 | Tags:Breaking News Hacking Equation group exploits hacking tools

ShadowBrokers complain nobody wants the Euquation Group’s full dump

The ShadowBrokers behind the Equation Group hack is very upset that no one is still bidding on the full dump of the NSA arsenal. Once again we are here to report about the NSA-linked Equation Group and its hacking arsenal leaked online by a group of hackers who called itself TheShadowBrokers. The group of hackers claimed to have hacked the NSA Equation Group
Publish At:2016-10-03 13:05 | Read:5972 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence Equation gr

Cisco Updates ASA Software to fix the Equation Group’s EXTRABACON exploit

Cisco has started releasing patches for its ASA software to address the Equation Group’s EXTRABACON exploit included in the NSA data dump leaked online. Security firms and IT giants are analyzing the huge archive leaked by the Shadow Brokers crew after the hack of the NSA-linked Equation Group. We reported that some of the exploits included in the arch
Publish At:2016-08-25 17:25 | Read:4611 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Security BENIGNCERTAIN Equ

NSA BENIGNCERTAIN tool can obtain VPN Passwords from CISCO PIX

Researchers tested the BENIGNCERTAIN tool included in the NSA data dump that allows attackers to extract VPN passwords from certain Cisco devices. Following the disclosure of the NSA dump, IT vendors Cisco and Fortinet issued security patches to fix the flaws exploited by the Equation Group in their products. Now, security researchers have uncovered another
Publish At:2016-08-21 03:35 | Read:3564 | Comments:0 | Tags:Breaking News Hacking BENIGNCERTAIN CISCO Equation group hac

hping3 – TCP/IP Packet Assembler & Analyser

hping is a command-line oriented TCP/IP packet assembler/analyser. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.While hping was mainly used as a
Publish At:2016-01-29 22:35 | Read:3573 | Comments:0 | Tags:Hacking Tools Network Hacking hping hping2 hping3 learn tcp/

RWMC – Retrieve Windows Credentials With PowerShell

RWMC is a Windows PowerShell script written as a proof of concept to Retrieve Windows Credentials using only PowerShell and CDB command-line options (Windows Debuggers).It allows to retrieve credentials from Windows 2003 to 2012 and Windows 10 (It was tested on 2003, 2008r2, 2012, 2012r2 and Windows 7 – 32 and 64 bits, Windows 8 and Windows 10 Home edi
Publish At:2016-01-26 04:10 | Read:3968 | Comments:0 | Tags:Hacking Tools Password Cracking Windows Hacking hacking wind

MITMf – Man-In-The-Middle Attack Framework

MITMf is a Man-In-The-Middle Attack Framework which aims to to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques.Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it’s been almost completely re-written from scratch to provide a mo
Publish At:2016-01-18 15:20 | Read:4108 | Comments:0 | Tags:Hacking Tools Network Hacking man in the middle framework ma

LaZagne – Password Recovery Tool For Windows & Linux

The LaZagne project is an open source password recovery tool used to retrieve passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases and so on). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. At this moment
Publish At:2015-12-29 07:05 | Read:5928 | Comments:0 | Tags:Windows Hacking Linux Hacking Hacking Tools Password Crackin

PowerSploit – A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. Basically PowerSploit is a PowerShell Post-Exploitation Framework that helps you with various tasks like DLL injection, invoking shellcode and setting up script persistence.It also includes reflective PE injection and ca
Publish At:2015-12-21 18:15 | Read:4145 | Comments:0 | Tags:Windows Hacking Hacking Tools powershell privilege escalatio

Pupy – Open-Source Remote Administration Tool AKA RAT

Pupy is an open-source remote administration tool (RAT), that is cross platform and has an embedded Python interpreter, allowing its modules to load Python packages from memory and transparently access remote Python objects. Pupy can communicate using different transports and have a bunch of cool features & modules. On Windows, Pupy uses reflective dll injec
Publish At:2015-12-14 23:30 | Read:4943 | Comments:0 | Tags:Hacking Tools Python trojan rat open source rat python rat r

SprayWMI – PowerShell Injection Mass Spray Tool

SprayWMI is a method for mass spraying Unicorn PowerShell injection to CIDR notations. It’s an alternative to traditional, ‘noisy’ tools which leave something on the disk like PsExec, smbexec, winexe and so on.These tools have worked really well, however, they are fairly noisy creating a service and touching disk which will trigger modern d
Publish At:2015-12-08 04:45 | Read:4857 | Comments:0 | Tags:Exploits/Vulnerabilities Hacking Tools Windows Hacking power

Zarp – Network Attack Tool

Zarp is a network attack tool centred around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker dir
Publish At:2015-11-28 09:40 | Read:4003 | Comments:0 | Tags:Hacking Tools Network Hacking arp poisoning network attack n

american fuzzy lop – Security Oriented Fuzzing Tool

American fuzzy lop is a security-oriented fuzzing tool that employs a novel type of compile-time instrumentation and genetic algorithms to automatically discover clean, interesting test cases that trigger new internal states in the targeted binary. This substantially improves the functional coverage for the fuzzed code. The compact synthesized corpora produc
Publish At:2015-11-20 20:50 | Read:2515 | Comments:0 | Tags:Hacking Tools Programming afl afl fuzzing afl-fuzz afl-fuzze


Share high-quality web security related articles with you:)


Tag Cloud