Now

This information concerns the security of your account (SCAM)

NUNCA HAY QUE HACER CASO A ESTE TIPO DE CORREOS SON UN TIMO. Esto ha llegado hoy a mi correo: Hi! I am a hacker who has access to your operating system. I also have full access to your account: At the time of hacking your account(@gmail.com) had this password: You can say: this is my, but old password! Or: I can change my password at any time! Of course! You will be right, but the fact is that when you change the password, my malicious code every time saved a new one! I’ve been watching you for a few […]

pspy – unprivileged linux process snooping

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea. The tool gathers it’s info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes. Getting started Get the tool onto the Linux machine you want to inspect. First get the […]

Dejavu: audio fingerprinting and recognition in Python

Audio fingerprinting and recognition algorithm implemented in Python, see the explanation here: How it works Dejavu can memorize audio by listening to it once and fingerprinting it. Then by playing a song and recording microphone input, Dejavu attempts to match the audio against the fingerprints held in the database, returning the song being played. Note that for voice recognition, Dejavu is not the right tool! Dejavu excels at recognition of exact signals with reasonable amounts of noise. Installation and Dependencies: Read INSTALLATION.md Setup First, install the above dependencies. Second, you’ll need to create a MySQL database where Dejavu can store fingerprints. […]

Ejecutar un ejemplo de reconocimiento de imágenes con TensorFlow realizando una conexión SSH a un contenedor Docker desde PowerShell en Windows

Crear contenedor Docker con TensorFlow desde un Terminal

Instalar desde el contenedor Docker que se está ejecutando con TensorFlow el servidor SSH para poder acceder desde PowerShell

Ejecutar un ejemplo de reconocimiento de imágenes con TensorFlow (más información en https://www.tensorflow.org/tutorials/image_recognition) realizando una conexión SSH a un contenedor Docker desde PowerShell en Windows La imagen que se va a reconocer es la de un oso panda Ejecutar los siguientes cmdlets desde PowerShell

lnkanalyser

Info Windows shortcut (LNK) files hold a wealth of useful information for forensic investigators. There are a number of LNK file parsers out there, and most are ok, some are incorrect and some just don’t get enough information extracted e.g. UUID parsing. Microsoft have now released the binary file format (see below) which makes it a lot easier to get things right. Another key source of information I have used is Harry Parsonage’s The Meaning of Life presentation/research. The research explains some of the more obscure information stored in LNK files, such as being able to detect whether a file […]

How to calculate Windows uptime?

THC-Hydra 8.6

Hydra is born more than 10 years ago, this page is used as a recap of the functionalities it provides, but also the differences in feature sets, services coverage and code between the most popular network authentication cracker tools available. Each feature is compared against Hydra as of the current version. This table is updated as new features are added to the project. If you find any inaccuracies on this page please do not hesitate to contact us. [0x00] News and Changelog Check out the feature sets and services coverage page – including a speed comparison against ncrack and medusa (yes, we […]

Faraday v2.4: Collaborative Penetration Test and Vulnerability Management Platform

Faraday Client is the software which will allow you to work with your favorite security tools and capture their output in an organized manner. It works under a GTK+3 interface with the popular VTE terminal with a custom ZSH shell that respects the user’s configuration (yes, that means you get to keep your exact ZSH terminal inside Faraday, even if you use ZPrezto or Oh My ZSH). Quick install Download the latest tarball or clone the Faraday Git Project:

Plugins Faraday plays well with others, right now it has more than 50 supported tools, among them you will find: […]

SpiderFoot 2.9.0

SpiderFoot 2.9.0 is now out, totaling almost 60 data collection/analysis modules for your reconnaissance, footprinting and OSINT needs. Here’s what’s new since 2.7.0 was announced here… *9* new modules: -Base64 string finder -Binary string searches (identifies file meta data) -Censys.io data collection (device info) -Cymon.io data collection (threat intel) -Hunter.io data collection (e-mail addresses) -psbdmp.com data collection (password dumps/breaches) -ThreatCrowd data collection (threat intel) -Squatted domain identification -Wikileaks.org data searches Search by e-mail addresses in addition to IPs, subnets, domains and hosts Massive reduction in false positives of junk files and social media accounts German, French and Spanish dictionaries added […]

PowerShell en la filtración de WikiLeaks (Vault 7: CIA Hacking Tools Revealed)

PowerShell Notes Create and Modify Your Powershell Profile First check whether or not your profile exists. Test-Path $profile If the query returned “False”, then your profile does not exist. Create your profile New-Item -path $profile -type file -force The output of the previous command will tell you where your profile was created.  The path given as the “Directory” output is the directory containing your profile.  It will be something like C:\Users\user1\Documents\WindowsPowerShell. Open Windows Explorer and go to that directory.  Your profile will be “Microsoft.PowerShell_profile.ps1”. By default your profile will be empty.  You can edit your profile to customize your powershell […]