Hide your IP with the Proxychains and Tor

Doing as pentester you must strive to be inconspicuous to avoid tracking your identity and block activities. The two common ways do to so are using proxy and VPN. ProxyChains is a UNIX program, that hooks network-related libc functions in dynamically linked programs via a preloaded DLL and redirects the connections through SOCKS4a/5 or HTTP … Read more

Top 10 cloud attack threads and vectors in 2022

In cybersecurity, attack threads means method used by an attacker to access a victim’s machine. An attack vector is a method of achieving unauthorized network access to launch a cyber attack. Method used by an attacker to gain access to a victim’s machine in order to infect it with malware. Let’s look at the most common … Read more

Remote wifi data logger with ESP8266

ESP8266 is a wonderful board with wifi cheapest supported monitoring mode and package injection. ESP8266 is available for only 4$ on Amazon, might be programmed with both Arduino C and micropython. To do so, on python, we need to flash the board with appropriate fireware. Today, I would show our simple Arduino project inspired by … Read more

Windows Exploit Suggester with WES-NG and Python3

Hi, folks. Today, I will show you the way to explore potential thread vectors and then security breaches on Windows OS with well-known awesome framework Windows Exploit Suggester. What is the Windows Exploit Suggester? This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the … Read more