• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

identify

  1. N

    How to identify what was the scam? Or any attack in general?

    So let's say a computer is brought in and has a virus or whatever. And a person wants to find out what downloaded link or how the computer was attacked. Is it possible to find out, or even gain access to the computer in the first place?  Would you be able to identify phishing attacks also? from...
  2. dEEpEst

    How to Identify Malicious Links On Internet

    How to Identify Malicious Links On Internet With the growing age of the internet where anything can be taught and learnt online, the number of people involved in cyber-crimes and online frauds have also increased significantly. Such an attempt is spreading malicious links over the internet. Its...
  3. itsMe

    Phyton Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks

    Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also...
  4. itsMe

    DDWPasteRecon: identify code leak, sensitive files, plaintext passwords, password hashes

    DDWPasteRecon Pastesites are websites that allow users to share plain text through public posts called “pastes.” Once attackers compromise the external perimeter and gain access to the internal resources they release the part of data on the “paste” sites like pastebin or hastebin. As these...
  5. itsMe

    Juumla - Tool Designed To Identify And Scan For Version, Config Files In The CMS Joomla!

    Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Features     Fast scan     Low RAM and CPU usage     Identify Joomla version     Config files detection     Open-Source Hidden content
  6. dEEpEst

    How To Identify Insecure, Untrusted Websites

    How To Identify Insecure, Untrusted Websites   There are about 1.7 billion websites are in the internet. All sites are different, some are blogs, some are tool websites, media websites, business, and so on... But unsafe, dangerous, spam websites are also there. Now how you can check that which...
  7. itsMe

    SUDO_KILLER v2.0.7 - identify and exploit sudo rules’ misconfigurations and vulnerabilities within sudo

    SUDO_KILLER is a tool that can be used for privilege escalation on the Linux environment by abusing SUDO in several ways. The tool helps to identify misconfiguration within sudo rules, vulnerability within the version of sudo being used (CVEs and vulns), and the use of dangerous binary, all of...
  8. itsMe

    Reverse Engineering Capa v1.1 RC1: identify capabilities in executable files

    capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate. Changelog v1.1 RC1    ...
  9. dEEpEst

    *Few* tips to staying safe online and preventing identify theft

    Hidden content
  10. B

    Google Helps Police Identify Devices Close to Crime Scenes Using Location Data

    Google Helps Police Identify Devices Close to Crime Scenes Using Location Data       April 15, 2019Swati Khandelwal It's no secret that Google tracks you everywhere, even when you keep...
Back
Top