Facebook Twitter
VASTO - The Virtualization Assessment Toolkit VASTO - The Virtualization Assessment Toolkit Vasto Virtualization ASsesment TOolkit Clicking moves left Clicking moves right VASTO is a Virtualization ASsessment TOolkit, a collection of Metasploit modules meant to be used as a testing tool to perform penetration tests or security audit of virtualization solutions. It has been sponsored by Secure Network and includes contributions by fellow hackers.
There is a new tool for anti virus bypass which allows an attacker to inject shellcode into a process Post exploitation. Enabling the attacker to pass a shell to a remote location, generally i assume this would be a meterpreter shell for obvious reasons. Those of us who penetration test for a living are aware of the need to sometimes have a shell after obtaining gui system access. Buuuut Antivirus can be a real pain in the ass sometimes. A few people came to me today saying they tried this new technique and it looked awesome but was not functioning correctly, below is a description of why it was not working for them and how to fix it.. here is a link for the program as reference. Bypassing AntiVirus With Process Injection Bypassing AntiVirus With Process Injection
Intelligent Information Security | Free Software
Herramientas on-line

Web Application Security Penetration Testing :: Collections
GPU Rainbow Cracker Overview The Cryptohaze GPU Rainbow Cracker is a fully GPU and OpenCL accelerated set of rainbow table tools. Unlike the existing CUDA accelerated rainbow table tools that simply accelerate the stock RainbowCrack tables, the Cryptohaze rainbow tables are a totally ground up implementation. GPU Rainbow Cracker
c1c2c3c4c5c6c7c8c9c10c11c12c13c14c15c16c17c18c19c20c21c22c23c24c25c26c27c28c29c30c31c32c33c34c35c36c37c38c39c40c41c42c43c44c45c46c47c48c49c50c51 r1r2r3r4r5r6r7r8r9r10r11r12r13r14r15r16r17r18r19r20r21r22r23r24r25r26r27r28r29r30r31r32r33r34r35r36r37r38r39r40r41r42r43r44r45r46r47r48r49r50r51r52r53r54r55r56r57r58r59r60r61r62r63r64r65r66 i1i2i3i4i5i6i7i8i9i10i11i12i13i14i15i16i17i18i19i20i21i22i23i24i25i26i27i28i29i30i31i32i33i34i35i36i37i38i39i40i41i42i43i44i45i46i47i48i49i50i51i52i53i54i55i56i57 Taller de Criptograf a de Arturo Quirantes Sierra Taller de Criptograf a de Arturo Quirantes Sierra
David R. Heffelfinger's - Free PDF Unlock Online Util Some PDF documents prevent the user from copying and pasting or printing it's contents. This sometimes presents a problem since the author of the PDF might have used a font that is not available in the sytem trying to read it. This page contains a free online utility that allows you to upload a PDF, once uploaded, a version of the PDF without printing or copying/pasting restrictions is displayed in a new browser window. To unlock a PDF file, enter it's location in the "PDF file to unlock" field, by either typing it in the field or clicking on the "browse" button, then navigating to it's location.

David R. Heffelfinger's - Free PDF Unlock Online Util

Security Database Tools Watch
Sacar contraseñas de firefox
Security Projects - Security Projects
viking [pipper]
Pandora FMS - Sistema de Monitorización Libre
Hacking the Dlink 502T router I have upgraded my 256kbps ADSL to 512kbps and it is bundled with Dlink 502T router. Soon after installation I found that it runs Linux :). Hacker inside me decided to play around this router. How do I Log in to router interface via telnet You can login over telnet. Hacking the Dlink 502T router
hacks - Google Code
La WeB de DragoN
diseño y fabricación de lectores de tarjeta inteligente
Tools | iSEC Partners iSEC Partners is an expert full-service information security firm. Our security assessments leverage our extensive knowledge of current security vulnerabilities, penetration techniques and software development best practices to enable customers to secure their applications against ever-present threats on the Internet. Primary emphasis is placed upon helping software developers build safe, reliable code. We also provide extensive research in many information security areas such as; application attack & defense, web services, operating system security, privacy, storage network security and malicious application analysis. Tools | iSEC Partners
Hispasec - Seguridad Informática Estas son las claves más conocidas que suelen modificar los troyanos para iniciarse con el sistema y bloquearlo. Hay muchos otros puntos de inicio, pero que no son utilizados por la mayoría del malware. Por ejemplo, el malware de la policía, SpyEye, zbot... todos usan normalmente alguna de esas ramas para arrancarse al inicio. En última instancia, al proteger el modo seguro, el usuario se asegura de que siempre podrá entrar en ese modo sin alteraciones. Siempre se aplicarán las reglas para el usuario bajo cuyo contexto se lanza el programa. Esto quiere decir que si se usan varios usuarios en el sistema, se debe lanzar para cada uno de ellos. Hispasec - Seguridad Informática
Instituto para la Seguridad en Internet - Cursos