Monday, November 7, 2016

http://websdr.org/ A WebSDR is a Software-Defined Radio




     A WebSDR is a Software-Defined Radio receiver connected to the internet, allowing many listeners to listen and tune it simultaneously. SDR technology makes it possible that all listeners tune independently, and thus listen to different signals; this is in contrast to the many classical receivers that are already available via the internet.

Wednesday, October 26, 2016

http://usbip.sourceforge.net/ - USB/IP PROJECT

     The USB/IP Project aims to develop a general USB device sharing system over IP network. To share USB devices between computers with their full functionality, USB/IP encapsulates "USB I/O messages" into TCP/IP payloads and transmits them between computers.

Wednesday, October 19, 2016

http://rada.re/ - Radare is a portable reversing framework that can Disassemble

https://github.com/radare/radare2


Radare is a portable reversing framework that can...
  • Disassemble (and assemble for) many different architectures
  • Debug with local native and remote debuggers (gdb, rap, webui, r2pipe, winedbg, windbg)
  • Run on Linux, *BSD, Windows, OSX, Android, iOS, Solaris and Haiku
  • Perform forensics on filesystems and data carving
  • Be scripted in Python, Javascript, Go and more
  • Support collaborative analysis using the embedded webserver
  • Visualize data structures of several file types
  • Patch programs to uncover new features or fix vulnerabilities
  • Use powerful analysis capabilities to speed up reversing
  • Aid in software exploitation

http://academy.ehacking.net/ - EH Academy is the brainchild of Ehacking



     EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

deltaxflux/fluxion - WiFi (WPA/WPA2) Hacking without Brute Force

https://github.com/deltaxflux/fluxion

http://www.ehacking.net/2016/10/wifi-wpawpa2-hacking-without-brute-force.html?utm_source=twitterfeed&utm_medium=linkedin+company+page&utm_campaign=Feed%3A+ehacking+%28Ehacking-+Your+Way+To+The+World+Of+IT+Security%29

How it works

  • Scan the networks.
  • Capture a handshake (can't be used without a valid handshake, it's necessary to verify the password)
  • Use WEB Interface *
  • Launch a FakeAP instance to imitate the original access point
  • Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
  • A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
  • A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  • Each submitted password is verified by the handshake captured earlier
  • The attack will automatically terminate, as soon as a correct password is submitted

Friday, October 7, 2016

http://www.cayenne-mydevices.com

Cayenne is the world’s first drag and drop IoT project builder that empowers developers, designers and engineers to quickly prototype and share their connected device projects. Cayenne was designed to help users create Internet of Things prototypes and then bring them to production.
 

https://www.offensive-security.com/

Offensive Security Training, Certifications and Services. The only provider of true performance-based penetration testing training for over a decade.