March 11th, 2019 | š
iSpeechA new mega data leak made the headlines, an unprotected MongoDB database (150GB) belonging to a marketing company exposed up
March 11th, 2019 | š
https://www.ispeech.org/text.to.speechVulnerability scanner for Linux/FreeBSD, agentless, written in golang. Twitter:Ā @vuls_en adsense size='1'] DEMO adsense size='1'] Abstract For a system administrator,
March 10th, 2019 | š
iSpeechCat-Nip Automated BasicĀ PentestĀ Tool this tool will make your basicĀ pentestingĀ task like Information Gathering, Auditing, AndĀ ReportingĀ so this tool will do every task
March 10th, 2019 | š
iSpeechThe malicious code targets both Windows and Linux systems, compromised systems are used to carry out brute force attacks along
March 9th, 2019 | š
iSpeech.orgThe theme at the ongoingĀ RSA 2019 conferenceĀ is āBetterā. As the official RSA page explains, āThis means working hard to find
March 9th, 2019 | š
https://www.ispeech.org GocaĀ is aĀ FOCAĀ fork written in Go, which is a tool used mainly to find metadata andĀ hiddenĀ information in the documents its
March 8th, 2019 | š
iSpeech.org Turbinia is an open-source framework for deploying, managing, and runningĀ distributedĀ forensicĀ workloads. It is intended to automate running of common forensic
March 8th, 2019 | š
Speech SynthesisA scripted pipeline of tools to simplify the bug bounty/penetration testĀ reconnaissanceĀ phase, so you can focus on chomping bugs Scope
March 8th, 2019 | š
https://www.ispeech.org The NSA released theĀ Ghidra, aĀ multi-platformĀ reverse engineering framework that could be used to find vulnerabilities and security holes in applications.
March 7th, 2019 | š
text to speech Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated networkĀ penetration testing frameworkĀ that
March 5th, 2019 | š
https://www.ispeech.org/text.to.speech IP obfuscator made to make a malicious ip a bit cuter A simple python tool to help you to
March 5th, 2019 | š
iSpeech.orgAutomate discovering and dropping payloads onĀ LANĀ Raspberry Pi's via ssh. rpi-hunter is useful when there are multipleĀ Raspberry Pi's on your LAN
March 4th, 2019 | š
iSpeech.org XNU suffers from a copy-on-write behavior bypass via mount of user-owned filesystem image. MD5Ā |Ā babb0ad99959bd04e0f28e89ee861d68 Download Source:Ā packetstormsecurity.com
March 4th, 2019 | š
iSpeechWhat is a CMS? Ā A content management system (CMS) manages the creation andĀ modificationĀ of digital content. It typically supports multiple users
Gloss