BALAGANESH

Wifi cracker – Pentesting Wifi Network with Fern WiFi Password Auditing Tool

A WiFi cracker is a software tool or program that is designed to exploit vulnerabilities in wireless networks and gain…

2 years ago

Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System

The purpose of this article is to provide you with a depth understanding of the Windows Registry and the Wealth…

2 years ago

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the…

3 years ago

Macro Pack – Automatize Obfuscation and Generation of Malicious Office Documents

Malware delivery trends change every day. For the last few years, we have observed various hacker groups like ( APT12…

4 years ago

Magecart Attack – Incident Investigation and The Key Takeaways

Magecart is a malicious threat actor ,operating in structured groups ( Group 1 to Group 6 ) and all this…

5 years ago

SSDEEP – Fuzzing Hashing Techniques to Detect Unknown Malware

AV vendors use various tools and techniques to identify the newly launched malware from the advisory. Before driving into reversing…

5 years ago

Organization Cyber Disaster Recovery Plan Checklist

Calamity occurrence in any area, arising from natural or man-made causes, or by accident or negligence which results in substantial…

5 years ago

WINSpect – Powershell Based Windows Security Auditing Toolbox

WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results of this audit can…

6 years ago

How to Transfer Data via Monitor Pixel Color Values (Monitor Screen as Covert Channel)

Assume that you want to transfer data from one machine to another machine. If you use public email services, FTP or…

6 years ago

TIDoS Framework -Web Penetration Testing Toolkit for Reconnaissance

Reconnaissance is a process to get information in-depth about the target. Keep gathering information until penetration testing phase is a…

6 years ago