BALAGANESH

BALAGANESH

Wifi cracker – Pentesting Wifi Network with Fern WiFi Password Auditing ToolWifi cracker – Pentesting Wifi Network with Fern WiFi Password Auditing Tool

Wifi cracker – Pentesting Wifi Network with Fern WiFi Password Auditing Tool

A WiFi cracker is a software tool or program that is designed to exploit vulnerabilities in wireless networks and gain…

2 years ago
Windows Registry Analysis – Tracking Every Activity That You Do on the Windows SystemWindows Registry Analysis – Tracking Every Activity That You Do on the Windows System

Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System

The purpose of this article is to provide you with a depth understanding of the Windows Registry and the Wealth…

2 years ago
JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScriptJSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the…

4 years ago
Macro Pack – Automatize Obfuscation and Generation of Malicious Office DocumentsMacro Pack – Automatize Obfuscation and Generation of Malicious Office Documents

Macro Pack – Automatize Obfuscation and Generation of Malicious Office Documents

Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12…

5 years ago
Magecart Attack – Incident Investigation and The Key TakeawaysMagecart Attack – Incident Investigation and The Key Takeaways

Magecart Attack – Incident Investigation and The Key Takeaways

Magecart is a malicious threat actor ,operating in structured groups ( Group 1 to Group 6 ) and all this…

5 years ago
SSDEEP – Fuzzing Hashing Techniques to Detect Unknown MalwareSSDEEP – Fuzzing Hashing Techniques to Detect Unknown Malware

SSDEEP – Fuzzing Hashing Techniques to Detect Unknown Malware

AV vendors use various tools and techniques to identify the newly launched malware from the advisory. Before driving into reversing…

5 years ago
Organization Cyber Disaster Recovery Plan ChecklistOrganization Cyber Disaster Recovery Plan Checklist

Organization Cyber Disaster Recovery Plan Checklist

Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial…

6 years ago

WINSpect – Powershell Based Windows Security Auditing Toolbox

WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results of this audit can…

6 years ago

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert Channel)

Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or…

6 years ago
TIDoS Framework -Web Penetration Testing Toolkit for ReconnaissanceTIDoS Framework -Web Penetration Testing Toolkit for Reconnaissance

TIDoS Framework -Web Penetration Testing Toolkit for Reconnaissance

Reconnaissance is a process to get information in-depth about the target. Keep gathering information until penetration testing phase is a…

6 years ago