Skip to main content

Released DllHijackAuditor v2 with New &

Released DllHijackAuditor v2 with New & Smart Interception Engine

DllHijackAuditor is the FREE tool to Audit against the  DLL Hijacking Vulnerability for any Windows application. This is recently discovered critical security vulnerability affecting most of Windows systems. Currently large number of applications are currently susceptible to this vulnerability which can allow any attacker to completely take over the system. . In the first version […]

Presenting DllHijackAuditor – Smart Tool

Presenting DllHijackAuditor – Smart Tool to Audit Dll Hijack Vulnerability

DllHijackAuditor is the FREE tool to Audit against the  DLL Hijacking Vulnerability for any Windows application. This is recently discovered critical security issue affecting almost all Windows systems on the planet. It appears that large amount of Windows applications are currently susceptible to this vulnerability which can allow any attacker to completely take over the […]

DLL Hijacking Exploit – All at One Plac

The web is full of recent DLL Hijacking Exploit after HDMoore and other security researchers have reported about numerous Windows applications suffering  from these flaws.  Here I have decided to put together simple version with all the relevant links at one place so that one gets the complete picture. . What is DLL Hijacking Vulnerability […]

Unleashing VASTO – A Virtualization Asse

Unleashing VASTO – A Virtualization Assesment Toolkit

VASTO is the first of its kind toolkit designed to asses the security of various Virtualization solutions including VMWare and Xen server.  It is implemented as set of modules which can be integrated into Metasploit , the popular penetration testing framework.  This makes it very easy for pen testers to directly integrate VASTO with their […]

Password Secrets of Popular Windows Appl...

Password Secrets of Popular Windows Applications

Here is the new article explaining  about password secrets of some of the popular applications.  It is going to explain about the password locations, storage techniques and encryption mechanism used by these applications. This application list has all category of applications such as Internet Browsers, Email Clients, Instant Messengers etc.  Some of prominent applications include […]

Book of the Month – Wireshark Network An

Book of the Month – Wireshark Network Analysis

“Wireshark Network Analysis” is the latest book on Wireshark, the top notch tool for network analyzer.Wireshark is used in analyzing network traffic, troubleshooting network problems on wired and wireless network. Either you are an network analyst,  administrator,  network security professional this will be the book that you don’t want to miss. The book is well […]

FireMasterLinux – Linux Port of FireMast

FireMasterLinux – Linux Port of FireMaster is on the Show

FireMasterLinux is the Linux port of popular FireMaster tool, an initiative by the elite members of  “rainbowsandpwnies” security group.  The team is headed byBroseidon along with fellow members. Currently base version of project is ready for Linux with the support for brute force password recovery. FireMaster is the first ever built tool to recover the […]

StreamArmor – New Tool to Scan & Sweep M

StreamArmor – New Tool to Scan & Sweep Malicious Streams

StreamArmor is the sophisticated tool for discovering hidden alternate data streams (ADS) as well as clean them completely from the system. It’s advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. It comes with fast multi threaded ADS scanner which can […]