Multi-Stage Phishing Campaign Leverages BYOD Concept to Target Organizations

Microsoft has released information regarding a multi-stage phishing effort that allowed attackers to use the concept of Bring Your Own Device (BYOD) to spread malware across an organization's network invisibly.…

Continue ReadingMulti-Stage Phishing Campaign Leverages BYOD Concept to Target Organizations


enumIAX is an Inter Asterisk Exchange protocol username brute-force enumerator. enumIAX may operate in two distinct modes; Sequential Username Guessing or Dictionary Attack. Sequential Username Guessing:- In Sequential Username Guessing…

Continue ReadingEnumIAX


Enum4linux is a tool for enumerating information from Windows and Samba systems. It attempts to offer similar functionality to enum.exe formerly available from It is written in Perl and…

Continue ReadingEnum4linux


DotDotPwn is a very flexible intelligent fuzzer to discover traversal directory vulnerabilities in software such as HTTP/FTP/TFTP servers, Web platforms such as CMSs, ERPs, Blogs, etc. Also, it has a…

Continue ReadingDotDotPwn


DNSwalk is a DNS debugger.  It performs zone transfers of specified domains and checks the database in numerous ways for internal consistency, as well as accuracy.   Download Link:-

Continue ReadingDNSWalk


Dnstracer determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data. Its behavior…

Continue ReadingDNSTracer