Profile

Cover photo
Ethical Hacking & Computer Security (DigitalMunition)
Lives in Grenoble, France
529 followers|59,073 views
AboutPostsPhotosVideos

Stream

 
This tool allows you to extract domains from a IP range, using the historic information archived in Virustotal(using API key). It is usefull if you want to know what domains are behind of this IP address, for example in bug bounty programs one of the…
This tool allows you to extract domains from a IP range, using the historic information archived in Virustotal(using API key). It is usefull if you want to know
1
Add a comment...
 
dns2proxy is an offensive DNS server that offers various features for post-exploitation once you’ve changed the DNS server of a victim. It’s very frequently used in combination with sslstrip. Features Traditional DNS Spoofing Implements DNS Spoofing via…
dns2proxy is an offensive DNS server that offers various features for post-exploitation once you’ve changed the DNS server of a victim. It’s very frequen
1
Add a comment...
 
automato should help with automating some of the user-focused enumeration tasks during an internal penetration test. automato is also capable of conducting limited brute force attacks such as: Testing to see if a list of users with a common password…
automato should help with automating some of the user-focused enumeration tasks during an internal penetration test. automato is also capable of conducting lim
1
Add a comment...
 
Chisel is a fast TCP tunnel, transported over HTTP. Single executable including both client and server. Written in Go (Golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your…
Chisel is a fast TCP tunnel, transported over HTTP. Single executable including both client and server. Written in Go (Golang). Chisel is mainly useful for pass
1
Add a comment...
 
A coalition of some of the globe’s top researchers and cryptographers are pleading with The Guardian to retract a story it published last week in which it suggested the encrypted messaging app WhatsApp contained a backdoor. The article, citing research by…
A coalition of some of the globe’s top researchers and cryptographers are pleading with The Guardian to retract a story it published last week in which it sug
1
Add a comment...
 
Many organizations always look forward to find threats as quickly as possible before they encounter any attack. Organizations especially are vulnerable if they don’t have real-time detection capabilities, and to prepare for any potential attack, it’s…
Many organizations always look forward to find threats as quickly as possible before they encounter any attack. Organizations especially are vulnerable if they
1
Add a comment...
 
New York Times And BBC Twitter Account Gets Hacked And Posted Fake News About US President Donald Trump and Russian President Putin. Fake tweets posted from @NYTvideo  and @BBC Northampton which is verified Twitter account. Cyber attackers hacked the…
New York Times And BBC Twitter Account Gets Hacked And Posted Fake News About US President Donald Trump and Russian President Putin. Fake tweets po
1
Add a comment...
 
WikiLeaks is calling for the release of President Donald Trump’s tax returns after Republican strategist and counselor to the commander-in-chief, Kellyanne Conway said Trump will not be releasing the much talked about files. The whistleblower site, which…
WikiLeaks is calling for the release of President Donald Trump’s tax returns after Republican strategist and counselor to the commander-in-chief, Kellyanne Co
1
Add a comment...
 
What are the differences between DoS and DDoS? You’ll be surprised to find out The terms DoS and DDoS might sound extremely similar because there is a ‘D’ missing from the two acronyms, but it turns out that there are several differences between the two…
DoS vs DDoS: Here are the differences that you didn’t know about
1
Add a comment...
 
icmpsh is a simple ICMP reverse shell with a win32 slave and a POSIX-compatible master in C, Perl or Python. The main advantage over the other similar open source tools is that it does not require administrative privileges to run onto the target machine.…
icmpsh is a simple ICMP reverse shell with a win32 slave and a POSIX-compatible master in C, Perl or Python. The main advantage over the other similar open sour
1
Add a comment...
 
Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. Recommended Usage For those wishing to run Glue, we recommend using the docker image because it should have…
Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. Recommended
1
Add a comment...
 
The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook Download this kit to learn everything you need to know about Information Security. The Essentials of Information Security brings together the latest in…
The Essentials of Information Security Kit: Includes a Free PC Security Handbook - 2nd Edition eBook Download this kit to learn everything you need to
1
Add a comment...
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Grenoble, France
Previously
Zarzis, Médenine, Tunisie
Basic Information
Gender
Male