background preloader

Security & intel

Facebook Twitter


Digital forensics

Real-time cyberworld stats from Kaspersky Lab. Infosec links & info. Security. Mixed Media X. Send Anonymous Emails: 20 Sites To Keep Your Identity Hidden. The first question to answer here is why go for anonymous email when there are plenty of premium featured and free email services such as Gmail, Outlook and Yahoo!

Send Anonymous Emails: 20 Sites To Keep Your Identity Hidden

Mail available? Well, privacy and anonymity is a digital right — our digital right. These email services are ‘free’ because of the advertisements. Although deemed necessary evils, ads are mostly tailored for the visitor or service user, and to do that, service providers need your data to show you advertisements targeted to you and your user group. These are ads that you are most likely to click and/or follow. Moreover, the disclosure of the motives of secret agencies and their top-secret internet-censoring programs (such as PRISM) has raised concerns among digital privacy advocates. Recommended Reading: VPN Protocols: Preserving Your Sensitive Information Online Anonymous email forms the basic foundation of anonymity over the web. Encrypted / Anonymous Email Service Send Emails Without Registration Receive Emails. Cryptosecurity Cyberprivacy.

Brandieself added: March, 2015. A lot of people contact us and ask: What are your preferred tools for Pentesting and which ones are free?

Brandieself added: March, 2015

Whilst there are hundreds and thousands of free Pentesting tools around, we seem to use only a core bunch of them as many have similar functionality. Some people may prefer one tool over another, but the bottom line is: There are many tools to achieve the same goal. Here is our personal list of preferred tools, which does by no means indicate that those are the only ones to use. Scanning NMAP Angry IP Scanner Firewalk OpenVAS Nexpose Penetration Testing Metasploit Framework Kali Linux Netcat Web Application Penetration Testing Burp Suite Acunetix SQLmap Nikto w3af owasp-zap Webscarab Wapiti Password Attacks and MITM Cain & Abel Snort THC Hydra Ettercap John the Ripper Medusa Wireless Attacks Aircrack-NG Suite Wifite Easy-Creds Evil-AP script dsniff, tcpdump, stringswatch, SSLStrip, TShark Ettercap zANTI (Android) Intercepter-NG (Android) dSploit (Android) Social Engineering.

99 Resources to Research & Mine the Invisible Web. College researchers often need more than Google and Wikipedia to get the job done.

99 Resources to Research & Mine the Invisible Web

To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction.

Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Derbycon 2015 - Blue Team Starter Kit. Description: A look at some of the low-cost tools that can be utilized by Blue Team members.

Derbycon 2015 - Blue Team Starter Kit

Tools include Redline for forensics, EMET for computer hardening, Zed Attack Proxy for web application security, and PDQ Deploy and Inventory for third party patch management. Descriptions of each tool, experiences and how I've used each of these tools, and short demos of each tool. U.S. Navy Veteran 2001-2007 Sysadmin, network administrator, now information security officer for state of South Carolina. ColaSec organizer, producer of PVC Security podcaster, and regular BSides attendee and photographer of South East. Search WikiLeaks. 2.

Search WikiLeaks

Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour. 3. Can You Find the Confession in this Statement? Communication. Fingerprint Sensors and Biometric Software Solutions. Knowledge. WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps.

Tools. Surveillance II. How encryption works in your web browser. CyberWar. SCADApedia. A blog is great for providing current information, but this information tends to age off and lose value over time.


Our answer to this problem is the SCADApedia. The SCADApedia is a set of pages covering topics of importance in ICS and control system IT. The best way to use it is either by the search feature in the web site or by clicking on the top level category links listed below. Let us know if you have suggestions for new topics, comments on existing topics or a page you would like to contribute. Send any or all of this to ICS Security Books ICS Security Event Calender Government Products Protocols Sectors Security Controls Standards Vendors Vulnerability Notes.



The NSA Files: PRISM & Boundless Information. Tools: Security - Forensics - Pentesting - Ethical Hacking. About Hackers & Hacks. Ethical Hacking. Security Tools.