Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 12/11/17 in all areas

  1. Mi-am facut si eu blog. Nu o sa scriu prea des, doar asa, din cand in cand... https://nytrosecurity.com/
    3 points
  2. cum era de asteptat s-a facut panic sell la greu ajungand pana la vreo 12 mii :))))) cine a stat pe pozitii culege roadele acu (inclusiv cei care au mai facut buy la 12 mii ) mai pun odata analiza, care a stiut sa profite bravo lui : http://www.newsbtc.com/2017/12/10/bitcoin-price-weekly-analysis-btc-usd-correction-underway/
    2 points
  3. https://www.ripstech.com/php-security-calendar-2017/
    2 points
  4. What is InfoCon? InfoCon is a community supported, non-commercial archive of all the past hacking related convention material that can be found. https://infocon.org/
    1 point
  5. Chiar ma gandeam ca ar trebui sa te intorci la knowledge sharing Daca vrei o sugestie: schimba numele domeniului. Poate o sa vrei in viitor sa iti faci o firma, iar numele e prea apropiat de Nitro Security (http://www.nitrosecurity.ro/ - firma de paza), si ar fi pacat sa nu iti poti folosi la maxim capitalul de imagine pe care o sa-l acumulezi cu blog-ul. Spor la scris!
    1 point
  6. M-am cacat pe mine de ras.
    1 point
  7. Dagon - Advanced Hash Manipulation Named after the prince of Hell, Dagon (day-gone) is an advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing algorithm verification, random salt generation from Unicode to ASCII, and much more. Note: Dagon comes complete with a Hash Guarantee: I personally guarantee that Dagon will be able to crack your hash successfully. At any point Dagon fails to do so, you will be given a choice to automatically create a Github issue with your hash. Once this issue is created, I will try my best to crack your hash for you. The Github issue is completely anonymous, and no questions will be asked. This is my way of thanking you for using Dagon. There are alternatives to using the automatic issue creator. If you do not want your hash publicly displayed, and feel Dagon has failed you, feel free to create your own issue. Or send an email with the hash information to dagonhashguarantee@gmail.com Screenshots Bruteforcing made easy with a built in wordlist creator if you do not specify one. The wordlist will create 100,000 strings to use Verify what algorithm was used to create that hash you're trying to crack. You can specify to view all possible algorithms by providing the -L flag (some algorithms are not implemented yet) Random salting, unicode random salting, or you can make your own choice on the salt. Demo video Download Preferable you can close the repository with git clone https://github.com/ekultek/dagon.git alternatively you can download the zip or tarball here Basic usage For full functionality of Dagon please reference the homepage here or the user manual python dagon.py -h This will run the help menu and provide a list of all possible flags python dagon.py -c <HASH> --bruteforce This will attempt to bruteforce a given hash python dagon.py -l <FILE-PATH> --bruteforce This will attempt to bruteforce a given file full of hashes (one per line) python dagon.py -v <HASH> This will try to verify the algorithm used to create the hash python dagon.py -V <FILE-PATH> This will attempt to verify each hash in a file, one per line Installation Dagon requires python version 2.7.x to run successfully. git clone https://github.com/ekultek/dagon.git cd Dagon pip install -r requirements.txt This should install all the dependencies that you will need to run Dagon Contributions All contributions are greatly appreciated and helpful. When you contribute you will get your name placed on the homepage underneath contributions with a link to your contribution. You will also get massive respect from me, and that's a pretty cool thing. What I'm looking for in contributions is some of the following: Hashing algorithm creations, specifically; A quicker MD2 algorithm, full Tiger algorithms, Keychain algorithms for cloud and agile More wordlists to download from, please make sure that the link is encoded Rainbow table attack implementation More regular expressions to verify different hash types Source: https://github.com/Ekultek/dagon
    1 point
  8. HouseProxy Protect your parents from phishing, HTTP proxy focused on block phishing URL's Install git clone https://github.com/mthbernardes/HouseProxy.git cd HouseProxy/ pip install -r requeriments.txt Config Edit etc/HouseProxy.conf to change de default user and password Create a entry in your DNS to house.proxy Usage $ hug -f index.py $ sudo echo "localhost house.proxy" >> /etc/hosts Set the house.proxy:3128 as your proxy Open the browser and access http://house.proxy:8000 Click in update blacklists It my take a while, the tool is downloading blacklists from phishitank and openphish. Done, now just try to access a malicious URL. Usage recomendation Install it on a raspberry pi, create a network, force all http traffics to pass through the pi on 3128 port (transparent proxy), and connect the clients to this network Download: HouseProxy-master.zip Source: github.com/mthbernardes/
    1 point
  9. mai nenicilor nu intelegeti bazele tranzctiilor bursiere, pentru fiecare short exista un long si viceversa. reflect on that. panic sell la greu dupa ora 6 :))))) http://www.newsbtc.com/2017/12/10/bitcoin-price-weekly-analysis-btc-usd-correction-underway/ care intelege bine, care nu sa se apuce de altceva.
    -1 points
×
×
  • Create New...