Tag Archives: Google

Instarecon – Automated Digital Reconnaissance

Instarecon is an automated basic digital reconnaissance. this will be a good addition during penetration testing to collect information

HiddenEye – Modern Phishing Framework

HiddenEye is a modern phishing framework that will allow user to create phishing website , run a keylogger to collect credentials, collect information about victims

Cangibrina – Fast Dashboard (admin) Finder

Cangibrina is a multi platform tool which aims to obtain the admin Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txt.

Cr3dOv3r – Test the Credential Reuse Attack

Cr3dOv3r is a tool that you can use to search online for leaked credentials and test the found username/password against well-known websites (ex: Facebook, Twitter, Google…).

Belkasoft Acquisition Toolkit

Belkasoft Acquisition Toolkit is a program that will create an image for incident handler to get required digital evidence for further analysis with any third party application.

Vulnerability Update, February 17, 2015

The Vulnerability Update from Secunia Total number of new vulnerabilities in the Top 20* over the 3 month period: 1,357 Vendor with most vulnerable products in the 3 month period: IBM Product with the most vulnerabilities: X.Org XServer And 2015

“Facebook Secrets” Malicious Chrome Extension

Google have made many security measures to increase the security of chrome extensions. This by adding patches to fix critical security vulnerabilities and enforcing a policy to allow users install extensions only from Chrome Web Store.  TrendMicro security researchers uncovered