The Capsulecorp Pentest is a small virtual network managed by Vagrant and Ansible. It contains five virtual machines, including one Linux attacking system running Xubuntu and 4 Windows 2019 servers configured with various vulnerable services. This project can be used to learn network penetration testing as a stand-alone environment but is ultimatly designed to complement my book The Art of Network Penetration Testing.
Whsniff is a command line utility that interfaces TI CC2531 USB dongle with Wireshark for capturing and displaying IEEE 802.15.4 traffic at 2.4 GHz.
This utility only works on Linux (including OpenWrt). For Windows download and install the SmartRF Packet Sniffer from TI website.
Whsniff reads the packets from TI CC2531 USB dongle with sniffer_fw_cc2531 firmware, converts to the PCAP format and writes to the standard output(stdout).
Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications. It currently provides multiple lightweight and hackable wireless protocol stacks, multiple highly customizable offensive modules, a chaining operator allowing to easily combine attack modules in order to build complex attack workflows (kind of like Metasploit), and support of multiple devices, such as HCI devices, Crazy Radio PA, RZUSBStick, BTLEJack, Nordic and Ubertooth sniffers.
Definitely not easy to use. I recommend working with a couple of other toolsets first, and then tinker one utility at a time with these.
A few ZigBee Tools to compliment KillerBee and learn the use of zbscapy. These tools leverage the KillerBee and Scapy-Com ZigBee Layer tools and functions. These tools are mainly examples of how to interact with different packet layers and fields while also, hopefully, providing some useful new functionality.
Curated list of awesome technology protocols with a reference to official RFCs.
Please note multiple researchers published and compiled this work. This is a list of their research in the 3G/4G/5G Cellular security space. This information is intended to consolidate the community's knowledge. Thank you, I plan on frequently updating this "Awesome Cellular Hacking" curated list with the most up to date exploits, blogs, research, and papers.
This is the PSU board for all your retro modding needs like making a GameBoy Zero with any of the Raspberry Pi products and it’s Clones like Orange Pi, Banana Pi etc, it has even powered Robots. This board has all the features the modding community wants and needs for their build into a small and powerful package. Outputs up to 6A @ 5.20v. i2c enabled, so the power cells can be monitored.
Drafts of the ebook Pentesting Hardware: A Practical Guide by Mark Carney.
The original homepage of IFJ. Maybe I can find someplace that still sells their stuff?
A curated list of all capture the flag tips and strategies.
A book that teaches the basics of reverse engineering software. CC-BY-SA. Has its own Git repo. Available in multiple languages.
This site is dedicated to preserving the history of early computer security digests and mailing lists, specifically those prior to the mid 1990's. This includes the Unix 'Security Mailing List', through to the Zardoz 'Security Digest' to the Core 'Security List', i.e. those preceeding BugTraq. These forums are a valuable insight into the embryonic development of the field of computer security, especially as it relates to the Internet, and the development of the Doctrine of Disclosure. Goes all the way back to the RTM worm in 1988 at the very least.
The best hacker's gadgets for Red Team pentesters and security researchers.
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
The project collects legitimate functions of Unix binaries that can be abused to break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.
If you're at a security conference, and you've got a ham radio license (of any class), grab your radio and set it to 146.580 simplex (no offset).
3480 links, including 121 private