Tag: deepfake voice
Deepfake Technology
by zitstif on Jan.27, 2020, under Videos
Deepfake technology can be used for malicious purposes. One notable example is when malicious actors used deepfake voice technology to swindle a CEO out of $243,000.
-
Welcome to #!/zitstif.no-ip.org/
-
Recent Posts
- Portable virtual lab that fits in your pocket
- Pentesting with Evil WinRM – Practical Exploitation [mubix]
- command-not-found.com script
- Useful post regarding Office 365 security hardening
- Deepfake Technology
- kubernetes.io web terminal root shell
- abuseipdb.com – ip list
- Some quick and easy tools for working with segmented networks/VLANs
- NetCAT remotely leaking keystrokes from a victim SSH session
- On-premise Exchange 2010 headaches
Calender
January 2021 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blogroll
- .:: Phrack Magazine ::.
- @GelosSnake
- /dev/ttyS0
- 100-hacking-tools-and-resources [hackerone.com]
- 2600: The Hacker Quarterly
- Academic Torrents
- Ansible is Simple IT Automation
- Anti Fraud News Blog | AntiFraudNews.com
- AppleExaminer Home
- Armis
- Attack-Defense Online Lab
- BackBox Linux | Flexible Penetration Testing Distribution
- BackTrack Linux
- Binary Revolution Forums
- BIOS Master Password Generator for Laptops
- BleepingComputer.com
- Blog – Black Hills Information Security
- Blog – NotSoSecure
- Blog | GoSecure
- BREAKDEV
- ByteXD – Practical Tutorials for Web Developers & Entrepreneurs
- carnal0wnage.attackresearch.com
- Cloudflare
- CloudSecDocs
- Command Line Kung Fu
- CommandLineFu
- Computer Forensics World
- Core Security Technologies (Blog)
- Cryptome
- CS6038/CS5138 Malware Analysis, UC
- CVE security vulnerability database
- Cyber Arch Blog
- Dark Operator
- Dark Reading
- Darknet – The Darkside | Ethical Hacking
- Default Password List for Routers
- Default passwords list
- Digital Forensiscs, Computer Forensics, eDiscovery | ForensicFocus.com
- DigitalMunition – Ethical Hacking & Computer Security
- Docker.com
- DSLReports Home Broadband ISP reviews, news, tools and forums
- DZone Security
- Electronic Frontier Foundation
- Exotic Liability
- Exploits Database by Offensive Security
- FOG Project
- Forensics Wiki
- Ghetto Forensics
- Ghidra
- GNUCITIZEN
- GTFOBins
- Guadicore: Cloud and Data Center Security Simplified
- Guardicore
- Hack A Day
- HackerOne – Bug Bounty program
- HackerspaceWiki
- Hacking-Printers
- Hak5
- Hash Generator
- HITB
- HolisticInfoSec
- Home – Virtue Security
- How-To Geek
- I2P Anonymous Network
- InfoSec Institute
- Infosec Island
- InfosecMatter
- Inj3ct0r – exploit database
- Insecure Magazine
- Inside Laura's Lab
- Instructables – Technology
- IronGeek
- iSecur1ty
- IT Security – stackexchange.com
- Kali Linux
- Katacoda – Interactive Learning Platform for Software Engineers
- KitPloit – PenTest Tools for your Security Arsenal
- Kon-boot
- Krebs On Security
- LaNMaSteR53.blog
- Learn Pentesting Online
- LibreNMS
- Lifehack – Tips for Life
- Lifehacker
- Linux Kodachi 6.2 The Secure OS
- Linux Security
- Live Hacking
- LiveOverflow – YouTube
- LMG Security
- MalwareTech
- Malwr – Malware Analysis by Cuckoo Sandbox
- Mandiant Blog
- MASS | Metal as a Service
- Metasploit Blog
- Metasploit Unleashed – Mastering the Framework
- MG
- MITRE ATT&CK
- MorningStar Security News
- Moxie Marlinspike >> Thoughtcrime Labs
- NETSEC – Ramblings of a NetSec addict
- news.ycombinator.com
- nixCraft – (www.cyberciti.biz)
- NTLM Decrypter
- Offensive-Security
- Online LM hash cracking engine
- Online Password Hash Crack
- OpenNIC Project
- OpenSecurity
- OpenSecurityTraining
- OpenWISP: Open Source Network Management System
- osquery | Easily ask questions about your Linux, Windows, and macOS Infrastructure
- OWASP
- Packet Life
- PacketStorm Securtiy
- Parrot Security
- Passbolt | Open source password manager for teams
- PaulDotCom
- Penetration Testing and Vulnerability Analysis Polytechnic Insitute
- Penetration Testing Lab
- Pentester Academy TV – Youtube
- Pentester Academy: Learn Pentesting Online
- PenTestIT
- PentHertz Blog
- Peteris Krumins' Blog
- Pi-hole
- Portcullis Labs
- Pritunl, Enterprise Distributed OpenVPN, IPsec and WireGuard Server
- PrivacyTools – Encryption Against Global Mass Surveillance
- Project Honey Pot
- Project Zero (Google)
- Qubes OS: A reasonably secure operating system
- RiskIQ Community Edition
- Risky Business
- Routerpwn
- SaltStack: Home
- samy kamkar – home
- Sanesecurity signatures: improve ClamAV detection rate
- SANS Digital Forensics Blog
- SANS Penetration Testing Blog
- Schneier on Security
- SecLists
- SecLists
- Secure Data Recovery Services
- Security Awareness Training | KnowBe4
- Security Database Tools Watch
- Security Insights | AdaptiveMobile
- Security Watch
- SecurityFocus
- SecurityTube.net
- SecurityTube.net Hack of the Day
- Server Fault
- ServeTheHome: Server, Storage, and Software Reviews
- Sevro Security | SS
- Shell is coming …
- Shelter Project
- SHODAN – Computer Search Engine
- Signal >> Home
- Silent Break Security Blog
- SkullSecurity
- Slashdot
- Snipe-It Free open source IT asset management
- SNOsoft Research Team
- Social Engineering – Security Through Education
- SpiderFoot
- Spy Culture | Intelligence Agencies and Popular Culture
- Stack Exchange
- Sucuri Blog
- Super User
- T E X T F I L E S
- Tails OS
- Tailscale – private networks made easy
- The Black Vault
- The C2 Matrix
- The Citizen Lab – University of Toronto
- The Ethical Hacker Network
- The Exploit Database
- The Free Thought Project – Your online news and discussion platform
- The No More Ransom Project
- The Pragmatic Bookshelf
- The Shadowserver Foundation
- the world.according to koto
- the-infosec
- THN: The Hacker News
- threatpost | The First Stop for Security News
- TinyPilot
- Top 100 Network Security Tools
- Tor Project | Anonymity Online
- TrustedSec News and Events (Blog)
- tssci security
- Unmask Parasites. Blog.
- Veil – AV Evasion
- Ventoy – A New Bootable USB Solution
- VIPER VAST
- virtuallyGhetto
- VoidSec
- Volatile Systems Blog
- Vulners – Vulnerability Data Base
- War Room
- Welcome to Enable Sysadmin | Enable Sysadmin
- What is this? Red Teaming Experiments
- What's My Pass?
- WikiLeaks
- Will Hack For SUSHI
- Windows Command Line -CMD commands, command prompt, batch files, Powershell
- Word List Downloads
- xorl