<?xml version="1.0" encoding="UTF-8"?>
      <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
        <channel>
          <title>HACK4NET - Pentest Tools and Cybersecurity News</title>
          <description>A source for Hacking, Cyber Security, Technology News, and Pentest tools for Technologists and Pentesters.</description>
          <link>https://hack4.net</link>
          <language>en-us</language>
          <lastBuildDate>Mon, 13 Apr 2026 02:35:47 GMT</lastBuildDate>
          <atom:link href="https://hack4.net/rss" rel="self" type="application/rss+xml"/>
          <managingEditor>team@hack4.net (HACK4NET Team)</managingEditor>
          <webMaster>team@hack4.net (HACK4NET Team)</webMaster>
          <category>Technology</category>
          <category>Cybersecurity</category>
          <category>Hacking</category>
          <ttl>60</ttl>
          
          <item>
            <title><![CDATA[A list of useful payloads and bypass for Web Application Security and Pentest/CTF: Payloadsallthethings]]></title>
            <description><![CDATA[Payloads All The Things&nbsp;
A list of useful payloads and bypasses for Web Application Security.
Feel free to improve with your payloads and techniques !

 ...]]></description>
            <link>https://hack4.net/post/a-list-of-useful-payloads-and-bypass-for-web-application-security-and-pentestctf-payloadsallthethings</link>
            <guid isPermaLink="true">https://hack4.net/post/a-list-of-useful-payloads-and-bypass-for-web-application-security-and-pentestctf-payloadsallthethings</guid>
            <pubDate>Mon, 30 Aug 2021 22:10:00 GMT</pubDate>
            <author>Umut</author>
            <category>bounty</category><category>bugbounty</category><category>bypass</category><category>cheatsheet</category><category>enumeration</category><category>hacking</category><category>hacktoberfest</category><category>methodology</category><category>payload</category><category>payloads</category><category>penetration-testing</category><category>pentest</category><category>privilege-escalation</category><category>redteam</category><category>security</category><category>vulnerability</category><category>web-application</category>
          </item>
        
          <item>
            <title><![CDATA[Free cross-platform password manager compatible with KeePass: Keeweb]]></title>
            <description><![CDATA[&nbsp;Free cross-platform password manager compatible with KeePass
This webapp is a browser and desktop password manager compatible with KeePass databases. It...]]></description>
            <link>https://hack4.net/post/free-cross-platform-password-manager-compatible-with-keepass-keeweb</link>
            <guid isPermaLink="true">https://hack4.net/post/free-cross-platform-password-manager-compatible-with-keepass-keeweb</guid>
            <pubDate>Mon, 30 Aug 2021 22:09:00 GMT</pubDate>
            <author>Umut</author>
            <category>electron</category><category>javascript</category><category>keepass</category><category>keeweb</category><category>password</category><category>password-manager</category><category>security</category>
          </item>
        
          <item>
            <title><![CDATA[Certificate authority and access plane for SSH, Kubernetes, web applications, and databases: Teleport]]></title>
            <description><![CDATA[



Read our Blog: https://goteleport.com/blog/


Read our Documentation: https://goteleport.com/docs/getting-started/

Table of...]]></description>
            <link>https://hack4.net/post/certificate-authority-and-access-plane-for-ssh-kubernetes-web-applications-and-databases-teleport</link>
            <guid isPermaLink="true">https://hack4.net/post/certificate-authority-and-access-plane-for-ssh-kubernetes-web-applications-and-databases-teleport</guid>
            <pubDate>Mon, 30 Aug 2021 22:09:00 GMT</pubDate>
            <author>Umut</author>
            <category>audit</category><category>bastion</category><category>certificate</category><category>cluster</category><category>clusters</category><category>firewall</category><category>firewalls</category><category>go</category><category>golang</category><category>jumpserver</category><category>kubernetes</category><category>kubernetes-access</category><category>pam</category><category>rbac</category><category>security</category><category>ssh</category><category>teleport</category><category>teleport-binaries</category>
          </item>
        
          <item>
            <title><![CDATA[Fast, multi-platform web server with automatic HTTPS: Caddy]]></title>
            <description><![CDATA[
    
    
    a  project


Every site on HTTPS
Caddy is an extensible server platform that uses TLS by default.



Features

Easy configuration with the...]]></description>
            <link>https://hack4.net/post/fast-multi-platform-web-server-with-automatic-https-caddy</link>
            <guid isPermaLink="true">https://hack4.net/post/fast-multi-platform-web-server-with-automatic-https-caddy</guid>
            <pubDate>Mon, 30 Aug 2021 22:09:00 GMT</pubDate>
            <author>Umut</author>
            <category>automatic-https</category><category>caddyfile</category><category>go</category><category>http</category><category>http-server</category><category>https</category><category>privacy</category><category>reverse-proxy</category><category>security</category><category>tls</category><category>web-server</category>
          </item>
        
          <item>
            <title><![CDATA[Meet Spox Phishing Kit for carding]]></title>
            <description><![CDATA[What is phishing kit?Phishing kits are generally kits provided by cyber-criminals to allow anyone with a little bit of IT knowledge to carry out a phishing...]]></description>
            <link>https://hack4.net/post/meet-spox-phishing-kit-for-carding</link>
            <guid isPermaLink="true">https://hack4.net/post/meet-spox-phishing-kit-for-carding</guid>
            <pubDate>Sun, 16 Aug 2020 11:32:00 GMT</pubDate>
            <author>Root</author>
            <category>hacking news</category><category>phishing</category><category>phishing toolkit</category><category>phishingkithunter</category>
          </item>
        
          <item>
            <title><![CDATA[Intel also hacked, private info, sources and tools leaked]]></title>
            <description><![CDATA[



It might take a while until further things will be released, while my source makes sure they're safe.
&nbsp;If you find password protected zips in the...]]></description>
            <link>https://hack4.net/post/intel-also-hacked-private-info-sources-and-tools-leaked</link>
            <guid isPermaLink="true">https://hack4.net/post/intel-also-hacked-private-info-sources-and-tools-leaked</guid>
            <pubDate>Fri, 07 Aug 2020 09:44:00 GMT</pubDate>
            <author>Root</author>
            <category>data leak</category><category>hacking news</category><category>leak</category><category>leaked</category>
          </item>
        
          <item>
            <title><![CDATA[Control IoT devices with thought power using Mindwave headset]]></title>
            <description><![CDATA[
What is Electroencephalography (EEG)What is Electroencephalography (EEG)







Electroencephalography (EEG) is an electrophysiological monitoring method to...]]></description>
            <link>https://hack4.net/post/control-iot-devices-with-thought-power-using-mindwave-headset</link>
            <guid isPermaLink="true">https://hack4.net/post/control-iot-devices-with-thought-power-using-mindwave-headset</guid>
            <pubDate>Fri, 10 Jan 2020 03:20:00 GMT</pubDate>
            <author>Root</author>
            <category>arduino</category><category>brain signal</category><category>eeg</category><category>electroencephalography</category><category>hacker equipment</category><category>how to</category><category>mindwave</category><category>mindwave headset</category>
          </item>
        
          <item>
            <title><![CDATA[PassGAN - A Deep Learning Approach for Password Guessing]]></title>
            <description><![CDATA[

&nbsp; &nbsp;State-of-the-art password guessing tools, such as HashCat and John the Ripper (JTR), enable users to check billions of passwords per second...]]></description>
            <link>https://hack4.net/post/passgan-a-deep-learning-approach-for-password-guessing</link>
            <guid isPermaLink="true">https://hack4.net/post/passgan-a-deep-learning-approach-for-password-guessing</guid>
            <pubDate>Mon, 10 Jun 2019 14:40:00 GMT</pubDate>
            <author>Umut</author>
            <category>cryptography</category><category>passwords</category>
          </item>
        
          <item>
            <title><![CDATA[miniLock - Drag-and-Drop Encryption]]></title>
            <description><![CDATA[

Drag-and-Drop Encryption&nbsp;miniLock


&nbsp; &nbsp; The encryption project named minilock, is a free and open-source program plugin witch&nbsp;lets...]]></description>
            <link>https://hack4.net/post/minilock-drag-and-drop-encryption</link>
            <guid isPermaLink="true">https://hack4.net/post/minilock-drag-and-drop-encryption</guid>
            <pubDate>Sun, 09 Jun 2019 14:45:00 GMT</pubDate>
            <author>Umut</author>
            <category>cryptography</category>
          </item>
        
          <item>
            <title><![CDATA[The Volatility Framework - Volatile Memory Extraction]]></title>
            <description><![CDATA[


&nbsp;&nbsp; The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the...]]></description>
            <link>https://hack4.net/post/the-volatility-framework-volatile-memory-extraction</link>
            <guid isPermaLink="true">https://hack4.net/post/the-volatility-framework-volatile-memory-extraction</guid>
            <pubDate>Sat, 08 Jun 2019 14:46:00 GMT</pubDate>
            <author>Umut</author>
            <category>Digital Forensics</category><category>memory analysis</category>
          </item>
        
          <item>
            <title><![CDATA[Fast internet-wide scanner - Nscan]]></title>
            <description><![CDATA[

Nscan: Fast internet-wide scanner


&nbsp; &nbsp; &nbsp;Nscan is a fast Network scanner optimized for internet-wide scanning purposes and inspired by Masscan...]]></description>
            <link>https://hack4.net/post/fast-internet-wide-scanner-nscan</link>
            <guid isPermaLink="true">https://hack4.net/post/fast-internet-wide-scanner-nscan</guid>
            <pubDate>Thu, 06 Jun 2019 14:48:00 GMT</pubDate>
            <author>Umut</author>
            <category>information gathering</category><category>Network Scanners</category><category>networking</category>
          </item>
        
          <item>
            <title><![CDATA[DbDat - Database Assessment Tool]]></title>
            <description><![CDATA[


&nbsp; &nbsp;DbDat performs numerous checks on a database to evaluate security. The categories of checks performed are configuration, privileges, users, and...]]></description>
            <link>https://hack4.net/post/dbdat-database-assessment-tool</link>
            <guid isPermaLink="true">https://hack4.net/post/dbdat-database-assessment-tool</guid>
            <pubDate>Wed, 05 Jun 2019 14:50:00 GMT</pubDate>
            <author>Umut</author>
            <category>database</category>
          </item>
        
          <item>
            <title><![CDATA[LFISuite - Totally Automatic LFI Exploiter & Scanner]]></title>
            <description><![CDATA[


Totally Automatic LFI Exploiter &amp; Scanner


&nbsp; &nbsp; &nbsp;LFI Suite is a totally&nbsp;automatic&nbsp;tool able to scan and exploit Local File...]]></description>
            <link>https://hack4.net/post/lfisuite-totally-automatic-lfi-exploiter-scanner</link>
            <guid isPermaLink="true">https://hack4.net/post/lfisuite-totally-automatic-lfi-exploiter-scanner</guid>
            <pubDate>Tue, 04 Jun 2019 17:46:00 GMT</pubDate>
            <author>Umut</author>
            <category>exploitation tools</category><category>Misc Scanners</category>
          </item>
        
          <item>
            <title><![CDATA[DragonBlood – New Vulnerability in WPA3 Protocol Let Hackers To Steal WiFi Password]]></title>
            <description><![CDATA[




Security researchers discovered a new vulnerability in WPA3 Protocol named as “Dragonblood” allows hackers to steal the WiFi Password from WP3 enabled...]]></description>
            <link>https://hack4.net/post/dragonblood-new-vulnerability-in-wpa3-protocol-let-hackers-to-steal-wifi-password</link>
            <guid isPermaLink="true">https://hack4.net/post/dragonblood-new-vulnerability-in-wpa3-protocol-let-hackers-to-steal-wifi-password</guid>
            <pubDate>Thu, 11 Apr 2019 06:40:00 GMT</pubDate>
            <author>Root</author>
            <category>dragonblood</category><category>hacking news</category><category>security</category><category>wifi</category><category>wpa3</category>
          </item>
        
          <item>
            <title><![CDATA[NSA Releases GHIDRA Source Code — Free Reverse Engineering Tool]]></title>
            <description><![CDATA[
NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its&nbsp;Github repository.





GHIDRA&nbsp;is...]]></description>
            <link>https://hack4.net/post/nsa-releases-ghidra-source-code-free-reverse-engineering-tool</link>
            <guid isPermaLink="true">https://hack4.net/post/nsa-releases-ghidra-source-code-free-reverse-engineering-tool</guid>
            <pubDate>Mon, 08 Apr 2019 06:13:00 GMT</pubDate>
            <author>Root</author>
            <category>hacking tool</category><category>reverse engineering</category><category>security tool</category>
          </item>
        
          <item>
            <title><![CDATA[Wireshark cheatsheet]]></title>
            <description><![CDATA[Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the...]]></description>
            <link>https://hack4.net/post/wireshark-cheatsheet</link>
            <guid isPermaLink="true">https://hack4.net/post/wireshark-cheatsheet</guid>
            <pubDate>Tue, 02 Apr 2019 09:31:00 GMT</pubDate>
            <author>Root</author>
            <category>how to</category><category>tutorial</category><category>wireshark</category>
          </item>
        
          <item>
            <title><![CDATA[SharpShooter - Payload Generation Framework]]></title>
            <description><![CDATA[


&nbsp; &nbsp;SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of...]]></description>
            <link>https://hack4.net/post/sharpshooter-payload-generation-framework</link>
            <guid isPermaLink="true">https://hack4.net/post/sharpshooter-payload-generation-framework</guid>
            <pubDate>Sun, 24 Mar 2019 18:28:00 GMT</pubDate>
            <author>Umut</author>
            <category>payload</category><category>post exploitation</category>
          </item>
        
          <item>
            <title><![CDATA[iWant - Decentralized Peer to Peer File Sharing]]></title>
            <description><![CDATA[


&nbsp; &nbsp; &nbsp; A command-line tool for searching and downloading files in LAN network, without any central server.

Features

Decentralized&nbsp;:...]]></description>
            <link>https://hack4.net/post/iwant-decentralized-peer-to-peer-file-sharing</link>
            <guid isPermaLink="true">https://hack4.net/post/iwant-decentralized-peer-to-peer-file-sharing</guid>
            <pubDate>Sun, 24 Mar 2019 18:27:00 GMT</pubDate>
            <author>Umut</author>
            <category>networking</category><category>system administration</category>
          </item>
        
          <item>
            <title><![CDATA[SIMP - System Integrity Management Platform]]></title>
            <description><![CDATA[




&nbsp; &nbsp; &nbsp;The System Integrity Management Platform (SIMP) is an&nbsp;Open Source&nbsp;framework designed around the concept that individuals and...]]></description>
            <link>https://hack4.net/post/simp-system-integrity-management-platform</link>
            <guid isPermaLink="true">https://hack4.net/post/simp-system-integrity-management-platform</guid>
            <pubDate>Tue, 19 Feb 2019 17:59:00 GMT</pubDate>
            <author>Umut</author>
            <category>system administration</category>
          </item>
        
          <item>
            <title><![CDATA[PCILeech - Direct Memory Access Attack]]></title>
            <description><![CDATA[




&nbsp; &nbsp; &nbsp;The PCILeech use the USB3380 chip in order to read from and write to the memory of a target system. This is achieved by using DMA over...]]></description>
            <link>https://hack4.net/post/pcileech-direct-memory-access-attack</link>
            <guid isPermaLink="true">https://hack4.net/post/pcileech-direct-memory-access-attack</guid>
            <pubDate>Tue, 19 Feb 2019 17:52:00 GMT</pubDate>
            <author>Umut</author>
            <category>hardware</category><category>hardware-projects</category><category>Project</category>
          </item>
        
          <item>
            <title><![CDATA[Tomb - Minimalistic CLI Tool to Manage Encrypted Volumes]]></title>
            <description><![CDATA[Tomb is an 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files. Tomb is written in code that is easy to...]]></description>
            <link>https://hack4.net/post/tomb-minimalistic-cli-tool-to-manage-encrypted-volumes</link>
            <guid isPermaLink="true">https://hack4.net/post/tomb-minimalistic-cli-tool-to-manage-encrypted-volumes</guid>
            <pubDate>Fri, 15 Feb 2019 18:15:00 GMT</pubDate>
            <author>Umut</author>
            <category>cryptography</category><category>Editor's Pick</category><category>encrypt</category><category>system administration</category>
          </item>
        
          <item>
            <title><![CDATA[DNSExfiltrator - Data Exfiltration over DNS Request Covert Channel]]></title>
            <description><![CDATA[    DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to...]]></description>
            <link>https://hack4.net/post/dnsexfiltrator-data-exfiltration-over-dns-request-covert-channel</link>
            <guid isPermaLink="true">https://hack4.net/post/dnsexfiltrator-data-exfiltration-over-dns-request-covert-channel</guid>
            <pubDate>Fri, 15 Feb 2019 18:15:00 GMT</pubDate>
            <author>Umut</author>
            <category>dns</category><category>Exfiltration</category><category>Tunneling</category>
          </item>
        
          <item>
            <title><![CDATA[APF - Advanced Policy Firewall]]></title>
            <description><![CDATA[


&nbsp; &nbsp; Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system designed around the essential needs of today’s Internet...]]></description>
            <link>https://hack4.net/post/apf-advanced-policy-firewall</link>
            <guid isPermaLink="true">https://hack4.net/post/apf-advanced-policy-firewall</guid>
            <pubDate>Wed, 13 Feb 2019 18:38:00 GMT</pubDate>
            <author>Umut</author>
            <category>firewall</category><category>networking</category><category>system administration</category>
          </item>
        
          <item>
            <title><![CDATA[BLEAH - BLE Scanner for Smart Devices Hacking]]></title>
            <description><![CDATA[


&nbsp; &nbsp; &nbsp;A BLE scanner for “smart” devices hacking based on the&nbsp;bluepy&nbsp;library, dead easy to use because retarded devices should be...]]></description>
            <link>https://hack4.net/post/bleah-ble-scanner-for-smart-devices-hacking</link>
            <guid isPermaLink="true">https://hack4.net/post/bleah-ble-scanner-for-smart-devices-hacking</guid>
            <pubDate>Tue, 12 Feb 2019 18:37:00 GMT</pubDate>
            <author>Umut</author>
            <category>bluetooth</category><category>Misc Scanners</category><category>Network Scanners</category>
          </item>
        
          <item>
            <title><![CDATA[net-creds - Sniff Sensitive Data From Interface or pcap]]></title>
            <description><![CDATA[


&nbsp; &nbsp; Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service...]]></description>
            <link>https://hack4.net/post/net-creds-sniff-sensitive-data-from-interface-or-pcap</link>
            <guid isPermaLink="true">https://hack4.net/post/net-creds-sniff-sensitive-data-from-interface-or-pcap</guid>
            <pubDate>Wed, 06 Feb 2019 20:25:00 GMT</pubDate>
            <author>Umut</author>
            <category>MITM</category><category>networking</category><category>Packet Inspection</category><category>sniffer</category>
          </item>
        
          <item>
            <title><![CDATA[Selfie stealing malware found in popular Android beauty camera apps]]></title>
            <description><![CDATA[



Google play Store flooding the several malicious beauty camera apps that steal Android users sensitive images and apps, the malicious app was already...]]></description>
            <link>https://hack4.net/post/selfie-stealing-malware-found-in-popular-android-beauty-camera-apps</link>
            <guid isPermaLink="true">https://hack4.net/post/selfie-stealing-malware-found-in-popular-android-beauty-camera-apps</guid>
            <pubDate>Tue, 05 Feb 2019 12:06:00 GMT</pubDate>
            <author>Root</author>
            <category>hacking news</category><category>news</category><category>play store</category><category>security</category><category>spyware apps</category>
          </item>
        
          <item>
            <title><![CDATA[About a billion records with emails and passwords leaked]]></title>
            <description><![CDATA[


Totally 87GB&nbsp;data&nbsp;– Find out if you are affected by the massive data breach.

Security researcher and founder of Have I Been Pwned, Troy Hunt, has...]]></description>
            <link>https://hack4.net/post/about-a-billion-records-with-emails-and-passwords-leaked</link>
            <guid isPermaLink="true">https://hack4.net/post/about-a-billion-records-with-emails-and-passwords-leaked</guid>
            <pubDate>Sun, 03 Feb 2019 18:33:00 GMT</pubDate>
            <author>Umut</author>
            <category>breach</category><category>hacking news</category><category>news</category><category>passwords</category>
          </item>
        
          <item>
            <title><![CDATA[phishery - SSL Enabled Basic Auth Credential Harvester]]></title>
            <description><![CDATA[An SSL Enabled Basic Auth Credential Harvesterwith a Word Document Template URL Injector     Phishery is a Simple SSL Enabled HTTP server with the primary...]]></description>
            <link>https://hack4.net/post/phishery-ssl-enabled-basic-auth-credential-harvester</link>
            <guid isPermaLink="true">https://hack4.net/post/phishery-ssl-enabled-basic-auth-credential-harvester</guid>
            <pubDate>Sun, 03 Feb 2019 15:52:00 GMT</pubDate>
            <author>Umut</author>
            <category>phishing</category><category>spoofing</category>
          </item>
        
          <item>
            <title><![CDATA[Puma Scan - Visual Studio Security Extension]]></title>
            <description><![CDATA[Visual Studio Security Extension       Puma Scan is the leading software security Visual Studio analyzer extension. Built on top of Roslyn, the open-source...]]></description>
            <link>https://hack4.net/post/puma-scan-visual-studio-security-extension</link>
            <guid isPermaLink="true">https://hack4.net/post/puma-scan-visual-studio-security-extension</guid>
            <pubDate>Sun, 03 Feb 2019 15:50:00 GMT</pubDate>
            <author>Umut</author>
            <category>code</category><category>Reporting</category>
          </item>
        
          <item>
            <title><![CDATA[Ransomware - Windows Crypto Ransomware in Go]]></title>
            <description><![CDATA[Windows Crypto Ransomware in Go    Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the...]]></description>
            <link>https://hack4.net/post/ransomware-windows-crypto-ransomware-in-go</link>
            <guid isPermaLink="true">https://hack4.net/post/ransomware-windows-crypto-ransomware-in-go</guid>
            <pubDate>Sun, 03 Feb 2019 15:50:00 GMT</pubDate>
            <author>Umut</author>
            <category>code</category><category>cryptography</category><category>encrypt</category><category>ransomware</category>
          </item>
        
          <item>
            <title><![CDATA[TrevorC2 - Command and Control via Legitimate Behavior over HTTP]]></title>
            <description><![CDATA[   TrevorC2 is a client/server model for masking command and control through a normally browsable website. Detection becomes much harder as time intervals are...]]></description>
            <link>https://hack4.net/post/trevorc2-command-and-control-via-legitimate-behavior-over-http</link>
            <guid isPermaLink="true">https://hack4.net/post/trevorc2-command-and-control-via-legitimate-behavior-over-http</guid>
            <pubDate>Sun, 03 Feb 2019 15:49:00 GMT</pubDate>
            <author>Umut</author>
            <category>Backdoors</category><category>Exfiltration</category><category>PostExploitation</category>
          </item>
        
          <item>
            <title><![CDATA[ROCK NSM - Response Operation Collection Kit]]></title>
            <description><![CDATA[MOCYBER&#8217;s open source Network Security Monitoring platform&nbsp;     ROCK is a collections platform, in the spirit of Network Security Monitoring,...]]></description>
            <link>https://hack4.net/post/rock-nsm-response-operation-collection-kit</link>
            <guid isPermaLink="true">https://hack4.net/post/rock-nsm-response-operation-collection-kit</guid>
            <pubDate>Sun, 03 Feb 2019 15:47:00 GMT</pubDate>
            <author>Umut</author>
            <category>network</category><category>networking</category><category>Packet Inspection</category><category>Reporting</category><category>sniffing</category>
          </item>
        
          <item>
            <title><![CDATA[Psrecon - PowerShell Incident Response]]></title>
            <description><![CDATA[Psrecon is an open source script that you can use to gather data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders,...]]></description>
            <link>https://hack4.net/post/psrecon-powershell-incident-response</link>
            <guid isPermaLink="true">https://hack4.net/post/psrecon-powershell-incident-response</guid>
            <pubDate>Sun, 03 Feb 2019 15:44:00 GMT</pubDate>
            <author>Umut</author>
            <category>dfir</category><category>Digital Forensics</category><category>indicent response</category><category>powershell</category>
          </item>
        
          <item>
            <title><![CDATA[TAP - TrustedSec Attack Platform]]></title>
            <description><![CDATA[   TAP is a remote penetration testing platform builder. For folks in the security industry, traveling often times becomes a burden and adds a ton of cost to...]]></description>
            <link>https://hack4.net/post/tap-trustedsec-attack-platform</link>
            <guid isPermaLink="true">https://hack4.net/post/tap-trustedsec-attack-platform</guid>
            <pubDate>Sun, 03 Feb 2019 15:29:00 GMT</pubDate>
            <author>Umut</author>
            <category>pentest tool</category><category>post exploitation</category>
          </item>
        
          <item>
            <title><![CDATA[Modlishka - Flexible and Powerful Reverse Proxy]]></title>
            <description><![CDATA[


Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns to the next level.
It was realeased with an aim to:

help...]]></description>
            <link>https://hack4.net/post/modlishka-flexible-and-powerful-reverse-proxy</link>
            <guid isPermaLink="true">https://hack4.net/post/modlishka-flexible-and-powerful-reverse-proxy</guid>
            <pubDate>Sat, 02 Feb 2019 13:11:00 GMT</pubDate>
            <author>Umut</author>
            <category>MITM</category><category>phishing</category><category>proxy</category><category>security tool</category>
          </item>
        
          <item>
            <title><![CDATA[CIRTKit - Tools for the Computer Incident Response Team]]></title>
            <description><![CDATA[


CIRTKit is not just a collection of tools, but also a framework to aid in the ongoing unification of Incident Response and Forensics investigation...]]></description>
            <link>https://hack4.net/post/cirtkit-tools-for-the-computer-incident-response-team</link>
            <guid isPermaLink="true">https://hack4.net/post/cirtkit-tools-for-the-computer-incident-response-team</guid>
            <pubDate>Tue, 29 Jan 2019 15:05:00 GMT</pubDate>
            <author>Umut</author>
            <category>carbon black</category><category>dfir</category><category>malware analysis</category>
          </item>
        
          <item>
            <title><![CDATA[Jok3r - Network and Web Pentest Framework]]></title>
            <description><![CDATA[









Jok3r&nbsp;is a Python3 CLI application which is aimed at&nbsp;helping penetration testers for network infrastructure and web black-box security...]]></description>
            <link>https://hack4.net/post/jok3r-network-and-web-pentest-framework</link>
            <guid isPermaLink="true">https://hack4.net/post/jok3r-network-and-web-pentest-framework</guid>
            <pubDate>Sat, 26 Jan 2019 18:00:00 GMT</pubDate>
            <author>Umut</author>
            <category>exploiting-vulnerabilities</category><category>hacking</category><category>hacking-tool</category><category>pentest tool</category><category>security</category><category>security-audit</category><category>security-tools</category><category>toolbox-management</category><category>vulnerability-scanners</category><category>web-hacking</category>
          </item>
        
          <item>
            <title><![CDATA[Shoot - A Testing Environment for Manual Security Testers]]></title>
            <description><![CDATA[
Sh00t

is a task manager to let you focus on performing security testing
provides&nbsp;To Do&nbsp;checklists of test cases
helps to create bug reports with...]]></description>
            <link>https://hack4.net/post/shoot-a-testing-environment-for-manual-security-testers</link>
            <guid isPermaLink="true">https://hack4.net/post/shoot-a-testing-environment-for-manual-security-testers</guid>
            <pubDate>Sat, 26 Jan 2019 12:58:00 GMT</pubDate>
            <author>Umut</author>
            <category>django</category><category>penetration testing</category><category>pentest tool</category><category>python</category><category>security tool</category>
          </item>
        
          <item>
            <title><![CDATA[Autosploit - Automated Mass Exploiter]]></title>
            <description><![CDATA[


As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the...]]></description>
            <link>https://hack4.net/post/autosploit-automated-mass-exploiter</link>
            <guid isPermaLink="true">https://hack4.net/post/autosploit-automated-mass-exploiter</guid>
            <pubDate>Fri, 25 Jan 2019 17:54:00 GMT</pubDate>
            <author>Umut</author>
            <category>automation</category><category>metasploit</category><category>offsec</category><category>pentest tool</category><category>python</category><category>security tool</category>
          </item>
        
          <item>
            <title><![CDATA[Malice - Free open source version of VirusTotal]]></title>
            <description><![CDATA[


Malice's mission is to be a free open source version of VirusTotal that anyone can use at any scale from an independent researcher to a fortune 500...]]></description>
            <link>https://hack4.net/post/malice-free-open-source-version-of-virustotal</link>
            <guid isPermaLink="true">https://hack4.net/post/malice-free-open-source-version-of-virustotal</guid>
            <pubDate>Thu, 24 Jan 2019 03:00:00 GMT</pubDate>
            <author>Umut</author>
            <category>analysis</category><category>infosec</category><category>malware</category><category>virustotal</category>
          </item>
        
          <item>
            <title><![CDATA[Remot3d - An Easy Way To Exploiting]]></title>
            <description><![CDATA[


It's easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language...]]></description>
            <link>https://hack4.net/post/remot3d-an-easy-way-to-exploiting</link>
            <guid isPermaLink="true">https://hack4.net/post/remot3d-an-easy-way-to-exploiting</guid>
            <pubDate>Wed, 23 Jan 2019 03:00:00 GMT</pubDate>
            <author>Umut</author>
            <category>backdoor</category><category>pentest tool</category>
          </item>
        
          <item>
            <title><![CDATA[HTCAP - Web application scanner able to crawl single page application]]></title>
            <description><![CDATA[



Htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM changes. Htcap is...]]></description>
            <link>https://hack4.net/post/htcap-web-application-scanner-able-to-crawl-single-page-application</link>
            <guid isPermaLink="true">https://hack4.net/post/htcap-web-application-scanner-able-to-crawl-single-page-application</guid>
            <pubDate>Tue, 22 Jan 2019 10:41:00 GMT</pubDate>
            <author>Umut</author>
            <category>arachni</category><category>security tool</category><category>single page application</category><category>spa</category><category>sqlmap</category><category>web application</category>
          </item>
        
          <item>
            <title><![CDATA[WPintel - Chrome Extension Designed For WordPress Vulnerability Scanning And Information Gathering]]></title>
            <description><![CDATA[




WordPress Vulnerability Scanner - Scan for vulnerabilities, version, themes, plugins and much more!

WPintel allows you to scan self hosted WordPress...]]></description>
            <link>https://hack4.net/post/wpintel-chrome-extension-designed-for-wordpress-vulnerability-scanning-and-information-gathering</link>
            <guid isPermaLink="true">https://hack4.net/post/wpintel-chrome-extension-designed-for-wordpress-vulnerability-scanning-and-information-gathering</guid>
            <pubDate>Tue, 22 Jan 2019 10:11:00 GMT</pubDate>
            <author>Umut</author>
            <category>information gathering</category><category>security</category><category>web application</category><category>wordpress</category>
          </item>
        
          <item>
            <title><![CDATA[kalitorify -Transparent proxy through Tor for Kali Linux OS]]></title>
            <description><![CDATA[
kalitorify is a shell script for&nbsp;Kali Linux&nbsp;which use&nbsp;iptables&nbsp;settings for transparent proxy through Tor, the program also allows you to...]]></description>
            <link>https://hack4.net/post/kalitorify-transparent-proxy-through-tor-for-kali-linux-os</link>
            <guid isPermaLink="true">https://hack4.net/post/kalitorify-transparent-proxy-through-tor-for-kali-linux-os</guid>
            <pubDate>Mon, 07 Jan 2019 17:21:00 GMT</pubDate>
            <author>Umut</author>
            <category>anonymous</category><category>network</category><category>onion</category><category>p2p</category><category>proxy</category><category>security tool</category><category>socks5</category><category>tor</category>
          </item>
        
          <item>
            <title><![CDATA[PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool]]></title>
            <description><![CDATA[
"PRinter Exploitation Toolkit" LAN automation tool



PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging,...]]></description>
            <link>https://hack4.net/post/pretty-printer-exploitation-toolkit-lan-automation-tool</link>
            <guid isPermaLink="true">https://hack4.net/post/pretty-printer-exploitation-toolkit-lan-automation-tool</guid>
            <pubDate>Sun, 06 Jan 2019 17:14:00 GMT</pubDate>
            <author>Umut</author>
            <category>pentest tool</category><category>post exploitation</category><category>python</category><category>security tool</category>
          </item>
        
          <item>
            <title><![CDATA[Singularity - DNS rebinding attack framework]]></title>
            <description><![CDATA[


Singularity of Origin&nbsp;is a tool to perform&nbsp;DNS rebinding&nbsp;attacks. It includes the necessary components to rebind the IP address of the attack...]]></description>
            <link>https://hack4.net/post/singularity-dns-rebinding-attack-framework</link>
            <guid isPermaLink="true">https://hack4.net/post/singularity-dns-rebinding-attack-framework</guid>
            <pubDate>Sat, 22 Dec 2018 14:46:00 GMT</pubDate>
            <author>Umut</author>
            <category>dns</category><category>fetch</category><category>rebinding</category><category>xhr</category>
          </item>
        
          <item>
            <title><![CDATA[fuddly - Fuzzing and Data Manipulation Framework]]></title>
            <description><![CDATA[


List of features

Graph-based data model that enables:
to represent complex data formats and also to mix them
complex data manipulations
to dissect/absorb...]]></description>
            <link>https://hack4.net/post/fuddly-fuzzing-and-data-manipulation-framework</link>
            <guid isPermaLink="true">https://hack4.net/post/fuddly-fuzzing-and-data-manipulation-framework</guid>
            <pubDate>Sat, 22 Dec 2018 14:32:00 GMT</pubDate>
            <author>Umut</author>
            <category>fuzzing</category><category>information gathering</category>
          </item>
        
          <item>
            <title><![CDATA[TIDoS-Framework - The Offensive Web Application Penetration Testing Framework]]></title>
            <description><![CDATA[





TIDoS is made to be comprehensive and versatile. It is a highly flexible framework where you just have to select and use modules.

But before that, you...]]></description>
            <link>https://hack4.net/post/tidos-framework-the-offensive-web-application-penetration-testing-framework</link>
            <guid isPermaLink="true">https://hack4.net/post/tidos-framework-the-offensive-web-application-penetration-testing-framework</guid>
            <pubDate>Sat, 22 Dec 2018 13:33:00 GMT</pubDate>
            <author>Umut</author>
            <category>exploitation</category><category>intelligence gathering</category><category>OSINT</category><category>reconnaissance</category><category>vulnerablity analysis</category>
          </item>
        
          <item>
            <title><![CDATA[CTFR - Abusing Certificate Transparency logs for getting HTTPS websites subdomains]]></title>
            <description><![CDATA[
Please, follow the instructions below for installing and run CTFR.

Pre-requisites

Make sure you have installed the following tools:
Python 3.0 or...]]></description>
            <link>https://hack4.net/post/ctfr-abusing-certificate-transparency-logs-for-getting-https-websites-subdomains</link>
            <guid isPermaLink="true">https://hack4.net/post/ctfr-abusing-certificate-transparency-logs-for-getting-https-websites-subdomains</guid>
            <pubDate>Sat, 22 Dec 2018 13:31:00 GMT</pubDate>
            <author>Umut</author>
            <category>dns</category><category>information gathering</category><category>subdomain</category>
          </item>
        
          <item>
            <title><![CDATA[RaspberryPi with Python for beginners]]></title>
            <description><![CDATA[



What is Raspberry Pi ?

The&nbsp;Raspberry Pi&nbsp;is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard...]]></description>
            <link>https://hack4.net/post/raspberrypi-with-python-for-beginners</link>
            <guid isPermaLink="true">https://hack4.net/post/raspberrypi-with-python-for-beginners</guid>
            <pubDate>Thu, 29 Nov 2018 12:37:00 GMT</pubDate>
            <author>Root</author>
            <category>course</category><category>how to</category><category>python</category><category>raspberry pi</category><category>tutorial</category>
          </item>
        
        </channel>
      </rss>