Security
Headlines
HeadlinesLatestCVEs

Tag

#Python

Trojan Source attack lets hackers exploit source code

By Waqas Trojan Source attack impacts all popular programming language compilers, such as C, C++, C#, Java, JavaScript, Python, Rust, and Go. This is a post from HackRead.com Read the original post: Trojan Source attack lets hackers exploit source code

HackRead
#Security#hacking#Java#Malware#Python#security#Source Code#Trojan Source#Vulnerability#java
All About Ring’s New Virtual Security Guard

By Owais Sultan Ring’s Virtual Security Guard is a live, customizable motion event monitoring service by Rapid Response that works with the external Ring cameras at home or business. This is a post from HackRead.com Read the original post: All About Ring’s New Virtual Security Guard

10 Free and Best OSINT Tools 2021

By Waqas OSINT refers to information collected from online sources however it requires tools to do so, and here are the 10 best OSINT Tools for 2020. This is a post from HackRead.com Read the original post: 10 Free and Best OSINT Tools 2021

QueenSono - Golang Binary For Data Exfiltration With ICMP Protocol

<p><a href="https://1.bp.blogspot.com/-p5_2_IEv9P8/YUuqKRcI1rI/AAAAAAAAvSg/hsnZHGNuRTEP9G-_v8lbWCSQYvVXbj3XQCNcBGAsYHQ/s1350/QueenSono_2_qssono-trunc.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" data-original-height="571" data-original-width="1350" height="270" src="https://1.bp.blogspot.com/-p5_2_IEv9P8/YUuqKRcI1rI/AAAAAAAAvSg/hsnZHGNuRTEP9G-_v8lbWCSQYvVXbj3XQCNcBGAsYHQ/w640-h270/QueenSono_2_qssono-trunc.gif" width="640" /></a></p><div><br /></div> <p style="text-align: left;"> QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been used within a system with basic ICMP inspection (ie. frequency and content length watcher). Try to imitate <a href="https://github.com/ytisf/PyExfil" rel="nofollow" target="_blank" title="PyExfil">PyExfil</a> (and others) with the idea that the target machine does not necessary have python installed (so provide a binary could be useful)</p...

On-The-Fly - Tool Which Gives Capabilities To Perform Pentesting Tests In Several Domains (IoT, ICS & IT)

<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-AL7wzHH2D8c/YUS_XCCASFI/AAAAAAAAvRM/D6gLmBwGwvIW1uCOBSLNnmJ41hRXQbwNgCNcBGAsYHQ/s480/on-the-fly_4.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="360" data-original-width="480" height="480" src="https://1.bp.blogspot.com/-AL7wzHH2D8c/YUS_XCCASFI/AAAAAAAAvRM/D6gLmBwGwvIW1uCOBSLNnmJ41hRXQbwNgCNcBGAsYHQ/w640-h480/on-the-fly_4.jpeg" width="640" /></a></div><p><br /></p><div class="snippet-clipboard-content position-relative" data-snippet-clipboard-copy-content=" ▒█████ ███▄ █ ▄▄▄█████▓ ██░ ██ ▓█████ █████ ██▓ ▓██ ██▓ ▒██▒ ██▒ ██ ▀█ █ ▓ ██▒ ▓▒▒▓██░ ██ ▓█ ▀ ▓██ ▓██▒ ▒██ ██▒ ▒██░ ██▒▓██ ▀█ ██▒ ▒ ▓██░ ▒░░▒██▀▀██ ▒███ ▒████ ▒██░ ▒██ ██░ ▒██ ██░▓██▒ ▐▌██▒ ░ ▓██▓ ░ ░▓█ ░██ ▒▓█ ▄ ░▓█▒ ▒██░ ░ ▐██▓░ ░ ████▓▒░▒██░ ▓██░ ▒██▒ ░ ░▓█▒░██▓▒░▒████ ▒░▒█░ ▒░██...

Rootend - A *Nix Enumerator And Auto Privilege Escalation Tool

<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-dlBoxE4Rzf4/YT_yEy5Zt0I/AAAAAAAAul8/_6UiYaOb1IY1WJtM2lqSN0YfsC0TxvixACNcBGAsYHQ/s663/rootend.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="575" data-original-width="663" src="https://1.bp.blogspot.com/-dlBoxE4Rzf4/YT_yEy5Zt0I/AAAAAAAAul8/_6UiYaOb1IY1WJtM2lqSN0YfsC0TxvixACNcBGAsYHQ/s16000/rootend.png" /></a></div><p><br /></p> <p>rootend is a python *nix Enumerator &amp; Auto <a href="https://www.kitploit.com/search/label/Privilege%20Escalation" target="_blank" title="Privilege Escalation">Privilege Escalation</a> tool.</p> <p><em>For a full list of our tools, please visit our website <a href="https://www.twelvesec.com/" rel="nofollow" target="_blank" title="https://www.twelvesec.com/">https://www.twelvesec.com/</a></em></p> <p>Written by:</p> <ul> <li><a href="https://github.com/nickvourd" rel="nofollow" target="_blank" title...