Home Authors Posts by Gabriel Sita

Gabriel Sita

Scammed Online

Tips For Prevention Of Getting Scammed Online

Hello Guys, If You are Into the Internet. You are aware of Scams. According to Yahoo Hackers stole 172 Billion Dollars in 2017. As we Provide Information to all of our Readers, we want...
Cryptocurrency exchanges

Cryptocurrency exchanges – Simple tips to avoid losing your funds

2018 was a bad year for the cryptocurrency industry as a whole. Besides weathering the crypto winter which saw cryptocurrency prices hit multi-year lows, the industry also had record-breaking amounts stolen from...
OS X login exploit

Com.apple.SystemLoginItems.plist Exploit

History A poorly documented feature of the OS X login process involves the system launching applications listed in the file /Library/Preferences/com.apple.SystemLoginItems.plist with root privileges. At the time of writing,...

Legion – Semi-Automated Network Penetration Testing Framework

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and...

Download Ghidra – NSA Software Reverse Engineering

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze...

Arecibo – Endpoint for Out-of-Band Exfiltration

In the process of identifying and exploiting vulnerabilities, it is sometimes necessary to resort to Out of Band (OOB) techniques in order to exfiltrate information through DNS resolutions or HTTP...

DFIRTrack – The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend. Installation and dependencies

DCOMrade – Powershell Script for Enumerating Vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to work...

Tyton – Kernel-Mode Rootkit Hunter

Loadable kernel modules, LKMs for short, are an integral companion to the Linux kernel. Typically, LKMs are used to add support for new hardware (as device drivers) or file systems or add...

Modlishka – Flexible and Powerful Reverse Proxy

Features Some of the most important ‘Modlishka’ features : Support for majority of 2FA authentication schemes (by...

More Articles