Showing all posts by Johnny Cash
Extract patterns of interest from suspicious files

Balbuzard is a package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses,…

Open source .NET deobfuscator and unpacker

de4dot is an open source (GPLv3) .NET deobfuscator and unpacker written in C#. It will try its best to restore…

Automatically extract obfuscated strings from malware

Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions of…

Install latest Wireshark on Debian

Add backports to your sources.list For jessie add this line: deb http://ftp.debian.org/debian jessie-backports maindeb http://ftp.debian.org/debian jessie-backports main to your sources.list…

Passive information gathering

Search Engines Gather information using search engines results Google Bing Reverse IP lookup using Bing: IP:x.y.z.yIP:x.y.z.y Yahoo Social Networking Sites…

Exploit Database – a repository for exploits and PoCs

The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and…

tmux – a terminal multiplexer

tmux is a terminal multiplexer. It enables a number of terminals to be created, accessed, and controlled from a single…

Debian – Awesome Zsh

Install zsh sudo apt-get install zshsudo apt-get install zsh Download prezto git clone –recursive https://github.com/sorin-ionescu/prezto.git ~/.zpreztogit clone –recursive https://github.com/sorin-ionescu/prezto.git ~/.zprezto…

VLAN hopping

VLAN hopping VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN. The…

Analyze multi-byte xor cipher

A tool to do some xor analysis guess the key length (based on count of equal chars) guess the key…

Previous Page · Next Page