Currently, software protection methods based on the use of cryptographic algorithms are widely used. Regarding the effectiveness of protection of this class, I would like to cite the opinion of Chris Kaspersky, author of the book "The Technique and philosophy of hacker attacks": "These defenses look unbreakable. They "look" because developers do not take into account the difference between theoretical models and practical implementation... a lot of the cryptosystems used are unreliable, and almost all are vulnerable to one degree or another"[20, p. 30].

Vulnerability of cryptographic protection systems

February 22 2024

TOR Bot Dark Web OSINT Tool

A distributed DDoS attack is carried out simultaneously from a large number of devices - attackers gain control over them and generate streams of garbage requests on command. Such an attack can cause a denial of service to the systems of a large company or network.

What is a DDoS attack and how to protect yourself from it?

Tool Information Gathering & social engineering Write By [Python,JS,PHP] DarkSide

social engineering DarkSide

This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.

social engineering



Awesome Social Engineering

A curated list of awesome social engineering resources, inspired by 

Awesome Social Engineering

A collaborative list of open-source iOS, iPad OS, watchOS, tvOS and vision OS apps

Open-Source

Because this system has so many moving parts, things may not "just work" until later versions. It is recommended to watch this repo so that you're notified when new versions are pushed. Big features like automated infrastructure deployment are coming soon.

Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls to get access to voicemail

Camelishing Social Engineering Tool

Camelishing Social Engineering Tool

The creation of a blockchain based voting system that maintains anonymity for constituents is the way of the future. 

Blockchain Ballots

A little repository containing my novice ideas aimed at strengthening the power of privacy, anonymity and political independence on the web

Storage for privacy

Anon is a browser to search the internet while keeping anonymity on the World Wide Web Alpha Version 1.0.0

World Wide Web Alpha Version 1.0.0

A Hive Plot visualization of Anonymity on the Dark Web

A Hive Plot visualization of Anonymity on the Dark Web

Triangle. Programming, neural networks, artificial intelligence, life in the IT field and anonymity on the web.

Triangle Programming

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    January 2025    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +5 Total articles 6764
  • +16 Comments 4260
  • +33 Users : 6287