Hacker Newsnew | past | comments | ask | show | jobs | submit | de-leon's submissionslogin
1.Cloakify – Hide, Data Exfiltrating and Infiltration in Plain Sight (seclist.us)
1 point by de-leon on Dec 11, 2016 | past
2.A toolkit to handle special cases of suspicious activities (seclist.us)
2 points by de-leon on Dec 11, 2016 | past
3.Lightbulb – An OSS Python framework for auditing web application firewalls (seclist.us)
55 points by de-leon on Nov 14, 2016 | past | 2 comments
4.Tool to automate exploit MongoDB server IP on Internet (seclist.us)
2 points by de-leon on Nov 13, 2016 | past
5.AutOSINT – is an open source intelligence gathering engagements (seclist.us)
3 points by de-leon on Nov 12, 2016 | past
6.Forensic tool for iOS that dump every critical information from a device (seclist.us)
3 points by de-leon on Nov 9, 2016 | past
7.Dissecting and Static Detection of Mobile Ransomware (seclist.us)
1 point by de-leon on Nov 6, 2016 | past
8.PowerForensics v1.1.1 – PowerShell – Live disk forensics platform (seclist.us)
2 points by de-leon on Oct 31, 2016 | past
9.Phishery – A Credential Harvester with a Word Document Template URL Injector (seclist.us)
2 points by de-leon on Oct 22, 2016 | past
10.A collection pentest tools and resources targeting Hadoop environments (seclist.us)
2 points by de-leon on Oct 22, 2016 | past
11.Mitmcanary – Tool/service to Detect Man in the Middle Attacks (seclist.us)
2 points by de-leon on Oct 9, 2016 | past
12.Tools to perform incident response and hunting operations all versions of windows (seclist.us)
1 point by de-leon on Oct 9, 2016 | past
13.Revealrk – Reveal Rootkit detects processes hidden by rootkits (seclist.us)
1 point by de-leon on Sept 7, 2016 | past
14.Fireaway is a tool for auditing and exfiltrating data against layer 7/AppID (seclist.us)
1 point by de-leon on Sept 5, 2016 | past
15.Poof will spoof location of your iOS device for Finding my Friends in the world (seclist.us)
1 point by de-leon on Sept 3, 2016 | past
16.Drozer v2.4.0 is a comprehensive security audit and attack framework for Android (seclist.us)
3 points by de-leon on Sept 1, 2016 | past
17.PEI stage firmware backdoor for UEFI based firmware (seclist.us)
1 point by de-leon on Aug 28, 2016 | past
18.Tools for injecting arbitrary in memory to bypass common antivirus solutions (seclist.us)
2 points by de-leon on Aug 27, 2016 | past
19.Anti-forensic tool that writes udev rules for known usb devices (seclist.us)
5 points by de-leon on Aug 24, 2016 | past
20.A PoC Off-Path TCP Exploits: Global Rate Limit Considered Dangerous (seclist.us)
7 points by de-leon on Aug 22, 2016 | past
21.Incident response tool to search for IOC of different format (Email, Phone, IP) (seclist.us)
1 point by de-leon on Aug 21, 2016 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: