Free Network and Geo Analysis Tools

Free Network and Geo Analysis Tools

1034 bookmarks
Newest
ORION night navigation, comb picks, latch tool
ORION night navigation, comb picks, latch tool
Sparrows Lock Picks manufacturers a full range of quality lock pick sets. We have a variety of lock pick sets all made with an extremely durable and flexible stainless steel. By consulting professionals in the community we have created what we believe is the very best in lock pick designs.
·sparrowslockpicks.ca·
ORION night navigation, comb picks, latch tool
Super Sniffer Card 1k & 4k, 4 Byte & 7 Byte | Sneak Technology - Engagement Setup
Super Sniffer Card 1k & 4k, 4 Byte & 7 Byte | Sneak Technology - Engagement Setup
Description Super Sniffer Card 1k & 4k Product Introduction The Super Sniffer card is a kind of card similar to the ChameleonMini that reads the random number in the process of M1 card interaction twice or more. After grabbing, the random number is read out by other software, supplemented by the UID of the card […]
·sneaktechnology.com·
Super Sniffer Card 1k & 4k, 4 Byte & 7 Byte | Sneak Technology - Engagement Setup
HydraNFC
HydraNFC
Introduction The HydraNFC is an incredibly powerful and flexible 13.56MHz NFC sniffing/reading/writing/emulating platform for 13.56MHz tags. The Hydra NFC is less expensive, more powerful/extensible than Proxmark3 Hardware and does not require an FPGA (all is done by the MCU Cortex M4F@168MHz with the help of HydraBus
·lab401.com·
HydraNFC
FIN7 Targets US Enterprises Via BadUSB
FIN7 Targets US Enterprises Via BadUSB

lilygo is popular, they are cheap chinese brand restrictions. The worst part is that, in my experience, many in security leadership mistakenly believe they have mitigated the threat by 'blocking USBs.' What they fail to realize is that traditional removable media controls do not prevent the use of these alternative input devices and leave them vulnerable and without appropriate detection strategies," Williams tells ISMG.

Netenrich's Morales adds that to disrupt the attack life cycle, one could whitelist approved hardware types, monitor for malicious use of PowerShell, and detect malicious software loaders. "But these process cost money, and require systems and people. Not inserting a random USB drive into a computer would be the simplest option," he says

·bankinfosecurity.com·
FIN7 Targets US Enterprises Via BadUSB
Overview of LTE Hacking
Overview of LTE Hacking
Documentation for the Division of Network and Systems Engineering’s Cyber Security Lab at KTH
·nse.digital·
Overview of LTE Hacking
Network Discovery with Nmap and Netdiscover
Network Discovery with Nmap and Netdiscover
Network discovery represents an important phase in the Information Gathering activity: it is the process of identifying live hosts on the network. This means...
·spreadsecurity.github.io·
Network Discovery with Nmap and Netdiscover
Command line for looking at specific port
Command line for looking at specific port
Is there a way to examine the status of a specific port from the Windows command line? I know I can use netstat to examine all ports but netstat is slow and looking at a specific port probably isn't.
·stackoverflow.com·
Command line for looking at specific port