1. IT-Security >
  2. IT Security Video >
  3. Introducing the Key Croc by Hak5 - the ultimate key-logging pentest implant

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Introducing the Key Croc by Hak5 - the ultimate key-logging pentest implant


IT Security Video vom | Direktlink: youtube.com Nachrichten Bewertung

...

Externe Webseite mit kompletten Inhalt öffnen



https://www.youtube.com/watch?v=rDdA4ggyc8E

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

    vom 463.34 Punkte ic_school_black_18dp
    Original release date: April 27, 2017 | Last revised: May 14, 2017Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurri
  • Pentest Tools Framework - A Database Of Exploits, Scanners And Tools For Penetration Testing

    vom 327.04 Punkte ic_school_black_18dp
    Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities.NEWS Modules PTF UPDATEPTF OPtions
  • FudgeC2 - A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell And .NET

    vom 326.59 Punkte ic_school_black_18dp
    FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining, and usage visibility.Note: FudgeC2 is currently in alpha stage, and should be used with cauti
  • IoT-Implant-Toolkit - Toolkit For Implant Attack Of IoT Devices

    vom 265.32 Punkte ic_school_black_18dp
    IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. With an easy-t
  • Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files

    vom 207.57 Punkte ic_school_black_18dp
    CERT Keyfinder is a utility for finding and analyzing key files on a filesystem as well as contained within Android APK files. CERT Keyfinder development was sponsored by the United States Department of Homeland Security (DHS). Installation requirements: Python (3.x recommended) androguard python-magic PyOpenSSL apktool grep OpenSSL Java Installation Obtain the Keyfinder code. This ca
  • IoT-Implant-Toolkit: A Framework For Implantation Attack Of IoT Devices

    vom 159.19 Punkte ic_school_black_18dp
    About IoT-Implant-Toolkit   IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis a
  • PivotSuite - A Network Pivoting Toolkit

    vom 146.74 Punkte ic_school_black_18dp
    PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client.PivotSuite as a Server :If the compromised host is directly accessable (Forward Connection) from Our pentest machine, Then we can run
  • Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner

    vom 143.9 Punkte ic_school_black_18dp
    celerystalk helps you automate your network scanning/enumeration process with asynchronous jobs (aka tasks) while retaining full control of which tools you want to run. Configurable - Some common tools are in the default config, but you can add any tool yo
  • ASP.NET Core Apps Observability

    vom 141.37 Punkte ic_school_black_18dp
    Thank you Sergey Kanzhelev for the support and review of this ASP.NET Core Apps Observability article. Modern software development practices value quick and continuous updates, following processes that minimize the impact of software failures. As impo
  • Strelka - Scanning Files At Scale With Python And ZeroMQ

    vom 135.7 Punkte ic_school_black_18dp
    Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin's Laika BOSS and similar projects (see: related projects), Strelka's purpose is to perfor
  • More Companies Plan To Implant Microchips Into Their Employees' Hands

    vom 119.4 Punkte ic_school_black_18dp
    "British companies are planning to microchip some of their staff in order to boost security and stop them accessing sensitive areas," reports the Telegraph. "Biohax, a Swedish company that provides human chip implants, told the Telegraph it was in talks
  • Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File

    vom 117.74 Punkte ic_school_black_18dp
    Automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its output to the terminal and the files in output-by-service/ and output-by-host/. Runs fast-returning commands first. Please send me protocols/commands/options t

Team Security Diskussion über Introducing the Key Croc by Hak5 - the ultimate key-logging pentest implant