Skip to content

September 1, 2025

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Digital Attack Map
    • Real-time web monitor AKAMAI
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /
  • tools

tools

Penta- Open Source All-in-one CLI To Automate Pentesting

Penta (PENTest + Automation tool) is Pentest automation tool using Python3.

Installation
Install requirements
penta requires the following packages.

Python3.7
pipenv

Resolve python package dependency.

$ pipenv install

If you dislike pi…

October 10, 2019
0 comment
Read More >>

Dolos Cloak- For Network Penetration Testers To Automated 802.1x Bypass

Dolos Cloak- Automated 802.1x Bypass

Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced man-in-the-middle attack.

The script is able to piggyback on the wired…

September 23, 2019
0 comment
Read More >>

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control.

The stub size is around 14kb and ca…

September 10, 2019
0 comment
Read More >>

Findomain- Fastest And Cross-platform Subdomain Enumerator

FinDomain- Fastest And Cross-platform Subdomain Enumerator.

Comparison
It comparison gives you a idea why you should use findomain instead of another enumerators. The domain used for the test was Microsoft.com in the following BlackArch virtual ma…

August 24, 2019
0 comment
Read More >>

Burp Suite Extension – To Monitor And Keep Track of Tested Endpoints

Burp Scope Monitor Extension

A Burp Suite Extension to monitor and keep track of tested endpoints.

Main Features

Simple, easy way to keep track of unique endpoints when testing an application
Mark individual endpoints as analyzed or not
Inst…

August 21, 2019
0 comment
Read More >>

Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap

Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.

With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.

PhanTap is silent in the network an…

August 7, 2019
0 comment
Read More >>

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible

CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible 

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using.

CloudFail is a tactical reconnaissance t…

August 2, 2019
0 comment
Read More >>

The Ultimate WinRM Shell For Penetration Testing

This shell is the ultimate WinRM shell for hacking/pentesting.

WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. 

A standard SOAP based protocol that allows hardware and operating systems from d…

July 31, 2019
0 comment
Read More >>

USBRIP- Simple Command Live Forensic Tool For Tracking USB device

Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.

usbrip (derived from “USB Ripper”, not “USB R.I.P.” astonished) is an open source forensics tool with CLI interface that lets you keep track…

July 29, 2019
0 comment
Read More >>

MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory

MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory

This package attempts to reduce the likelihood of sensitive data being exposed. It supports all major operating systems and is written in pure Go.

Features

Sens…

July 28, 2019
0 comment
Read More >>
1 … 3 4 5 6

Archives

September 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
« Aug    

Recent Posts

  • Israel says it killed longtime spokesman of Hamas’s military wing – The Washington Post September 1, 2025
  • Spy cameras: are you being watched? – podcast September 1, 2025
  • Amazon will sell you the iPhone 16 Pro for $250 off right now – how the deal works September 1, 2025
  • Neo-Nazis attack Indigenous protest site after anti-immigration rally in Melbourne as officer allegedly assaulted in Sydney September 1, 2025
  • Let’s be blunt: Putin has called Trump’s bluff on Ukraine September 1, 2025
  • Q&A with Lyft CEO David Risher on three consecutive profitable quarters, cofounders leaving the board, Freenow acquisition, the economics of robotaxis, and more (J. Edward Moreno/Sherwood News) September 1, 2025
  • Indonesia tightens security after deadly protests September 1, 2025

Categories Cloud

africa (3120) Americas (33435) AM Update (4138) Army (3355) Australia news (7880) Business (10276) China (4536) Culture (3126) Cyber Security (3501) cybersecurity (3004) Cyber Security News (3952) Donald Trump (3970) Environment (4162) Europe (14636) Foreign Policy (3359) france (3396) Hacking (7291) Health (3134) homesecurity (3609) IFP Exclusive (3037) India (7940) Israel (4263) Mary Patriot News (4801) Media Wire (4597) middle east (5079) Nation (9227) Nation, Nation & World (4853) Nation, World (8745) News (33138) politics (6984) russia (5783) Security (5675) Society (2950) Sports (8086) Tankers (3708) Technology (3200) UK news (16240) ukraine (5282) Uncategorized (3574) US Crime News (5762) US news (11714) US politics (18629) World (70204) World news (22336) worldNews (25292)
RSS Error: A feed could not be found at `https://nvd.nist.gov/download/nvd-rss-analyzed.xml`; the status code is `404` and content-type is `text/html;charset=UTF-8`

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

September 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
« Aug    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive