Security Research, Thinking Like a Hacker, And Rootkit Development
December 22nd, 2015 | ๐
TTS Demo Gary McGraw talks to Jamie Butler about the importance of an offensive security approach, attack patterns, and his
December 22nd, 2015 | ๐
TTS Demo Gary McGraw talks to Jamie Butler about the importance of an offensive security approach, attack patterns, and his
December 22nd, 2015 | ๐
iSpeech You may have come across ads on the internet offering last minute Christmas deals. With many of you being
December 22nd, 2015 | ๐
iSpeech Bluetooth device and service discovery tool that can be used for security assessment and penetration testing.ย BluPhish is written in
December 22nd, 2015 | ๐
Free Text to Speech Hackazon is a free, vulnerable test site that is an online storefront built with the same
December 22nd, 2015 | ๐
https://www.ispeech.org Sublist3r is python tool that is designed to enumerate subdomains of websites using search engines. It helps penetration testers
December 22nd, 2015 | ๐
https://www.ispeech.org/text.to.speech Sandboxed Execution Environment (SEE) is a framework for building test automation in secured Environments.ย The Sandboxes, provided via libvirt, are
December 22nd, 2015 | ๐
iSpeech.org Wearable technologies are today on the rise, becoming more common and broadly available to mainstream users. In fact, wristband
December 22nd, 2015 | ๐
Text to Speech VoicesPowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during
December 22nd, 2015 | ๐
iSpeechThe IT security researcher โChris Vickeryโ who exposed MacKeeper and Hzone >data breach has now discovered a hack of database
December 22nd, 2015 | ๐
https://www.ispeech.org This is just another GUI for volatility and yara which could make someone's life easier. It is inteded for
December 22nd, 2015 | ๐
iSpeech DEFCON AI Time lapse From a mod I made. video, sharing, camera phone, video phone, free, upload 2015-12-21 23:15:43
Gloss