Isnin, Januari 29, 2024

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Read more


  1. Hacker Tools Windows
  2. New Hack Tools
  3. Hacking Tools Pc
  4. Hacker Tools For Pc
  5. Hack Tools Online
  6. Hacker Tools Hardware
  7. What Is Hacking Tools
  8. Pentest Recon Tools
  9. Pentest Recon Tools
  10. New Hacker Tools
  11. Pentest Reporting Tools
  12. Pentest Tools Windows
  13. Hacker Hardware Tools
  14. Ethical Hacker Tools
  15. Nsa Hacker Tools
  16. Hack App
  17. Hack Tools
  18. Kik Hack Tools
  19. Hacking Tools Mac
  20. Best Pentesting Tools 2018
  21. Hack Tools For Pc
  22. Tools 4 Hack
  23. Hackers Toolbox
  24. Hack Tools For Ubuntu
  25. Pentest Tools Alternative
  26. Hacking Tools Github
  27. Hacker Tools Github
  28. Hacking Tools For Pc
  29. Pentest Tools Open Source
  30. Hacks And Tools
  31. Tools 4 Hack
  32. Pentest Tools For Windows
  33. Hacking Tools Hardware
  34. Nsa Hacker Tools
  35. What Is Hacking Tools
  36. Pentest Tools Website
  37. Physical Pentest Tools
  38. Hack Tools For Ubuntu
  39. What Is Hacking Tools
  40. Hacking Tools For Windows
  41. Best Hacking Tools 2020
  42. Pentest Automation Tools
  43. Hacking Tools For Windows Free Download
  44. Pentest Box Tools Download
  45. Hacker
  46. Tools For Hacker
  47. Pentest Tools Tcp Port Scanner
  48. Hack Tools For Games
  49. Computer Hacker
  50. Pentest Tools Website
  51. Hacking Tools Windows
  52. Hacking Tools Windows 10
  53. Hacking Tools 2019
  54. New Hacker Tools
  55. Pentest Tools Nmap
  56. Hacking Tools Software
  57. Hackers Toolbox
  58. Hacker Tools 2019
  59. Hacking Tools Software
  60. Underground Hacker Sites
  61. Tools For Hacker
  62. Wifi Hacker Tools For Windows
  63. New Hacker Tools
  64. New Hack Tools
  65. Hack And Tools
  66. Hacking Tools Hardware
  67. Hacking Tools Pc
  68. What Is Hacking Tools
  69. Hack Tools Download
  70. Pentest Tools Website
  71. Hack Rom Tools
  72. Hacking Tools 2020
  73. Pentest Tools Tcp Port Scanner
  74. Easy Hack Tools
  75. Pentest Tools Kali Linux
  76. Hack Tools For Ubuntu
  77. Pentest Tools Linux
  78. Hacker Hardware Tools
  79. Easy Hack Tools
  80. Hacking Tools 2020
  81. Hack Website Online Tool
  82. Hacking Tools Download
  83. Pentest Tools List
  84. Hacking Tools Usb
  85. Ethical Hacker Tools
  86. Pentest Tools List
  87. How To Make Hacking Tools
  88. Beginner Hacker Tools
  89. Hacking App
  90. Hacking Tools Free Download
  91. Hack Website Online Tool
  92. Pentest Tools For Ubuntu
  93. Hacker Tools For Ios
  94. Pentest Automation Tools
  95. Hack Tools For Ubuntu
  96. Hack Tools For Games
  97. Hack Tool Apk
  98. Pentest Tools For Android
  99. Pentest Tools Website Vulnerability
  100. Hacking Tools Windows 10
  101. Hacking Tools For Windows Free Download

Water Softener for Well Water: A Comprehensive Guide

What is a Water Softener and How Does it Work?

A water softener is a device that removes hardness from water, typically by exchanging calcium and magnesium ions for sodium ions. This process, known as ion exchange, occurs within a resin bed, which is composed of small, porous beads made of a material called ion-exchange resin.

Why is a Water Softener Needed for Well Water?

Well water often contains high levels of dissolved minerals, including calcium and magnesium, which cause hardness. Hard water can create several problems, such as:

  1. Scale Buildup: Hard water can cause scale buildup in pipes, appliances, and fixtures, reducing their efficiency and lifespan.
  2. Soap Scum: Hard water can make it difficult to create a lather with soap, resulting in soap scum buildup on surfaces.
  3. Dry Skin and Hair: Hard water can strip away natural oils from skin and hair, leading to dryness and irritation.
  4. Reduced Detergent Effectiveness: Hard water can reduce the effectiveness of detergents, making it harder to clean clothes and dishes.
How to Choose the Right Water Softener for Well Water:
  1. Water Hardness Level: The first step in choosing a water softener is to determine the hardness level of your well water. There are several ways to do this, including purchasing a water test kit or sending a sample of your water to a laboratory for analysis.
  2. Flow Rate: Consider the flow rate of your well water system when selecting a water softener. The flow rate is measured in gallons per minute (GPM) and determines the size of the water softener you need.
  3. Grain Capacity: The grain capacity of a water softener refers to its ability to remove hardness from water. The grain capacity is measured in kilograins (KGR) and determines how much hardness the water softener can remove before it needs to be regenerated.
  4. Type of Water Softener: There are two main types of water softeners: salt-based and salt-free. Salt-based water softeners use a process called ion exchange to remove hardness from water, while salt-free water softeners use a different process, such as template-assisted crystallization.
  5. Brand and Reputation: Consider the brand and reputation of the water softener manufacturer when making a purchase. Look for brands that are known for their quality, reliability, and customer service.
How to Install and Maintain a Water Softener for Well Water:
  1. Proper Installation: It is important to have a water softener installed by a qualified professional. Improper installation can lead to leaks, damage to the water softener, or ineffective water softening.
  2. Regular Regeneration: Water softeners need to be regenerated regularly to maintain their effectiveness. The frequency of regeneration depends on the hardness of your water and the size of the water softener.
  3. Salt Replenishment: Salt-based water softeners require regular replenishment of the salt supply. The frequency of replenishment depends on the hardness of your water and the size of the water softener.
  4. Maintenance: Water softeners should be inspected and maintained regularly to ensure proper operation and longevity. This may include cleaning the resin bed, checking for leaks, and replacing any worn or damaged parts.
Benefits of Using a Water Softener for Well Water:
  1. Improved Water Quality: Treated water has a reduced mineral content, improving the taste, smell, and appearance of the water.
  2. Reduced Scale Buildup: This can save you money by extending the lifespan of your appliances.
  3. Softer Skin and Hair: Softened water can help to improve the health of your skin and hair.
  4. More Effective Laundry and Dishwashing: Softened water can improve the performance of detergents and soaps.
  5. Increased Energy Efficiency: Softened water can help to improve the efficiency of water heaters and other appliances that use water.
Conclusion:

A water softener can be a valuable investment for well water users, providing numerous benefits and improving overall water quality. By choosing the right water softener and properly installing and maintaining it, you can enjoy the advantages of softened water throughout your home.

--
You received this message because you are subscribed to the Google Groups "Broadcaster" group.
To unsubscribe from this group and stop receiving emails from it, send an email to broadcaster-news+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/broadcaster-news/9aa09de1-81fa-4c7e-ad67-17431e4b7165n%40googlegroups.com.

Ahad, Januari 28, 2024

Reversing Pascal String Object

There are many goodware and malware developed in pascal, and we will see that the binary generated by the pascal compilers is fascinating, not only because the small and clean generated binaries, or the  clarity of the pascal code, but also the good performance. In Linux we have Lazarus which is a good free IDE like Delphi and Kylix the free pascal IDE for windows.

The program:

program strtest;

var
  cstr:  array[0..10] of char;
  s, s2:  ShortString;

begin
  cstr := 'hello world';
  s  := cstr;
  s2 := 'test';
  
  WriteLn(cstr + ' ' + s + ' ' + s2);
end.


We are going to compile it with freepascal and lazarus, and just the binary size differs a lot:

lazarus          242,176 btytes  845 functions
freepascal       32,256 bytes   233 functions
turbopascal      2,928 bytes     80 functions  (wow)

And surprisingly turbopascal binaries are extremely light.
Lets start with lazarus:




Logically it imports from user32.dll some display functions, it also import the kernel32.dll functions and suspiciously the string operations of oleaut32.dll 


And our starting point is a function called entry that calls the console initialization and retrieve some console configurations, and then start a labyrinth of function calls.



On functions 10000e8e0 there is the function that calls the main function.

I named execute_param2 because the second param is a function pointer that is gonna be executed without parameters, it sounds like main calling typical strategy.
And here we are, it's clearly the user code pascal main function.


What it seems is that function 100001800 returns an string object, then is called its constructor to initialize the string, then the string is passed to other functions that prints it to the screen.

This function executes the method 0x1c0 of the object until the byte 0x89 is a null byte.
What the hell is doing here?
First of all let's create the function main:


Simply right button create function:

After a bit of work on Ghidra here we have the main:


Note that the struct member so high like 0x1b0 are not created by default, we should import a .h file with an struct or class definition, and locate the constructor just on that position.

The mysterious function was printing byte a byte until null byte, the algorithm the compiler implemented in asm is not as optimized as turbopascal's.

In Windbg we can see the string object in eax after being created but before being initialized:












Just before executing the print function, the RCX parameter is the string object and it still identical:


Let's see the constructor code.
The constructor address can be guessed on static walking the reverse-cross-references to main, but I located it in debugging it in dynamic analysis.


The constructor reads only a pointer stored on the string object on the position 0x98.

And we have that the pointer at 0x98 is compared with the address of the literal, so now we know that this pointer points to the string.
The sentence *string_x98 = literal confirms it, and there is not memory copy, it only points reusing the literal.



Freepascal

The starting labyrinth is bigger than Lazarus so I had to begin the maze from the end, searching the string "hello world" and then finding the string references:


There are two ways to follow the references in Ghidra, one is [ctrl] + [shift] + F  but there is other trick which is simply clicking the green references texts on the disassembly.

At the beginning I doubted and put the name possible_main, but it's clearly the pascal user code main function.




The char array initialization Is converted by freepascal compiler to an runtime initialization using mov instructions.

Reducing the coverage on dynamic we arrive to the writeln function:


EAX helds  a pointer to a struct, and the member 0x24 performs the printing. In this cases the function can be tracked easily in dynamic executing the sample.

And lands at 0x004059b0 where we see the WriteFile, the stdout descriptor, the text and the size supplied by parameter.


there is an interesting logic of what happens if WriteFile() couldn't write all the bytes, but this is other scope.
Lets see how this functions is called  and how text and size are supplied to figure out the string object.



EBX helds the string object and there are two pointers, a pointer to the string on 0x18 and the length in 0x18, lets verify it on windbg.


And here we have the string object, 0x0000001e is the length, and 0x001de8a68 is the pointer.


Thanks @capi_x for the pascal samples.

More information
  1. Pentest Tools Open Source
  2. Kik Hack Tools
  3. Hacking Tools Mac
  4. Pentest Tools Linux
  5. Hacker Tool Kit
  6. Hack Tools For Ubuntu
  7. Ethical Hacker Tools
  8. Hackrf Tools
  9. Hack Tools
  10. Hacking Tools Kit
  11. Hacking Tools Github
  12. Pentest Tools For Ubuntu
  13. Hacker Tools For Ios
  14. Bluetooth Hacking Tools Kali
  15. Hack Tools For Ubuntu
  16. Hacker Tools
  17. Pentest Tools For Mac
  18. Hacking Tools
  19. Tools For Hacker
  20. Hacking Tools Mac
  21. Best Pentesting Tools 2018
  22. Pentest Tools Find Subdomains
  23. Pentest Tools Find Subdomains
  24. Pentest Tools Windows
  25. Hacking Tools Windows
  26. Hack Website Online Tool
  27. Hacker Techniques Tools And Incident Handling
  28. Pentest Automation Tools
  29. Hacking Tools For Beginners
  30. Black Hat Hacker Tools
  31. Hacking Tools Hardware
  32. Hacking Tools And Software
  33. Hacking Tools
  34. Hacker Tools Github
  35. Hacking Tools For Windows Free Download
  36. Computer Hacker
  37. Best Pentesting Tools 2018
  38. Hacking Tools Pc
  39. Hacking Tools Software
  40. Hack Tools Github
  41. Tools 4 Hack
  42. Pentest Box Tools Download
  43. Tools 4 Hack
  44. Hacking Tools Mac
  45. Hacker Tools Windows
  46. Pentest Reporting Tools
  47. Hacker Tools Mac
  48. Pentest Tools Open Source
  49. Blackhat Hacker Tools
  50. Hacker Tools Free
  51. Pentest Tools For Mac
  52. Pentest Tools Port Scanner

One Reason Why InfoSec Sucked In The Past 20 Years - The "Security Tips" Myth

From time to time, I get disappointed how much effort and money is put into securing computers, networks, mobile phones, ... and yet in 2016 here we are, where not much has changed on the defensive side. There are many things I personally blame for this situation, and one of them is the security tips.

The goal of these security tips is that if the average user follows these easy to remember rules, their computer will be safe. Unfortunately, by the time people integrate these rules into their daily life, these rules either become outdated, or these rules were so oversimplified that it was never true in the first place. Some of these security tips might sound ridiculous to people in InfoSec nowadays, but this is exactly what people still remember because we told them so for years.

PDF is safe to open

This is an oldie. I think this started at the time of macro viruses. Still, people think opening a PDF from an untrusted source is safer than opening a Word file. For details why this is not true, check: https://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-497/Adobe-Acrobat-Reader.html
On an unrelated note, people still believe PDF is integrity protected because the content cannot be changed (compared to a Word document).
Image stolen from Kaspersky

Java is secure

One of the best ones. Oracle started marketing Java as a safe language, where buffer overflows, format strings and pointer-based vulnerabilities are gone. Unfortunately, they forgot to tell the world that instead of "unsafe programs developed by others" they installed their unsafe program on 3 billion devices. 

Stay away from rogue websites and you will be safe

This is a very common belief I hear from average people. "I only visit some trusted news sites and social media, I never visit those shady sites." I have some bad news. At the time of malvertising and infected websites, you don't have to visit those shady sites anymore to get infected.

Don't use open WiFi

I have a very long explanation of why this makes no sense, see here. Actually, the whole recommendation makes no sense as people will connect to public WiFis, no matter what we (InfoSec) recommend.

The password policy nightmare

Actually, this topic has been covered by myself in two blog posts, see here and here. Long story short: use a password manager and 2-factor authentication wherever possible. Let the password manager choose the password for you. And last but not least, corporate password policy sux.

Sites with a padlock are safe

We tell people for years that the communication with HTTPS sites are safe, and you can be sure it is HTTPS by finding a randomly changing padlock icon somewhere next to the URL. What people hear is that sites with padlocks are safe. Whatever that means. The same goes for WiFi - a network with a padlock is safe.

Use Linux, it is free from malware

For years people told to Windows users that only if they would use Linux they won't have so much malware. Thanks to Android, now everyone in the world can enjoy malware on his/her Linux machine.

OSX is free from malware

It is true that there is significantly less malware on OSX than on Windows, but this is an "economical" question rather than a "security" one. The more people use OSX, the better target it will become. Some people even believe they are safe from phishing because they are using a Mac!

Updated AV + firewall makes me 100% safe

There is no such thing as 100% safe, and unfortunately, nowadays most malware is written for PROFIT, which means it can bypass these basic protections for days (or weeks, months, years). The more proactive protection is built into the product, the better!

How to backup data

Although this is one of the most important security tips which is not followed by people, my problem here is not the backup data advise, but how we as a community failed to provide easy to use ways to do that. Now that crypto-ransomware is a real threat to every Windows (and some OSX) users, even those people who have backups on their NAS can find their backups lost. The only hope is that at least OSX has Time Machine which is not targeted yet, and the only backup solution which really works.
The worst part is that we even created NAS devices which can be infected via worms ...

Disconnect your computer from the Internet when not used

There is no need to comment on this. Whoever recommends things like that, clearly has a problem.

Use (free) VPN to protect your anonimity

First of all. There is no such thing as free service. If it is free, you are the service. On another hand, a non-free VPN can introduce new vulnerablities, and they won't protect your anonymity. It replaces one ISP with another (your VPN provider). Even TOR cannot guarantee anonymity by itself, and VPNs are much worse.

The corporate "security tips" myth

"Luckily" these toxic security tips have infected the enterprise environment as well, not just the home users.

Use robots.txt to hide secret information on public websites

It is 2016 and somehow web developers still believe in this nonsense. And this is why this is usually the first to check on a website for penetration testers or attackers.

My password policy is safer than ever

As previously discussed, passwords are bad. Very bad. And they will stick with us for decades ...

Use WAF, IDS, IPS, Nextgen APT detection hibber-gibber and you will be safe

Companies should invest more in people and less into magic blinking devices.

Instead of shipping computers with bloatware, ship computers with exploit protection software
Teach people how to use a password safe
Teach people how to use 2FA
Teach people how to use common-sense

Conclusion

Computer security is complex, hard and the risks change every year. Is this our fault? Probably. But these kinds of security tips won't help us save the world. 

Related news

  1. Pentest Tools
  2. Hacker Tools For Mac
  3. Hacking Tools Name
  4. Hack Tool Apk No Root
  5. Github Hacking Tools
  6. Pentest Tools For Ubuntu
  7. Hack Tools For Ubuntu
  8. Pentest Tools For Mac
  9. Hacking Tools Software
  10. Pentest Tools Github
  11. Hackrf Tools
  12. Nsa Hack Tools Download
  13. Hacker Tools Windows
  14. Hacker Tools Linux
  15. Hacking Tools Free Download
  16. Hacking Tools For Kali Linux
  17. Black Hat Hacker Tools
  18. Tools For Hacker
  19. Computer Hacker
  20. Android Hack Tools Github
  21. Top Pentest Tools
  22. Growth Hacker Tools
  23. Hacks And Tools
  24. Pentest Tools For Windows
  25. Beginner Hacker Tools
  26. What Is Hacking Tools
  27. Pentest Tools Apk
  28. Pentest Recon Tools
  29. Computer Hacker
  30. Hacker Tools Apk Download
  31. Pentest Tools Apk
  32. Hack Apps
  33. Hacking Tools Usb
  34. Hacker Hardware Tools
  35. Tools Used For Hacking
  36. Hacker Tools Linux
  37. Pentest Tools For Mac
  38. World No 1 Hacker Software
  39. Hacker Tools Free
  40. Hacker Tools Mac
  41. How To Hack
  42. Hacking Tools For Games
  43. Pentest Tools Online
  44. Hacker Tools Windows
  45. Hacker Tools Hardware
  46. Hacker Tools Free
  47. Nsa Hacker Tools
  48. Hack App
  49. Nsa Hack Tools Download
  50. Kik Hack Tools
  51. Hacker Security Tools
  52. Pentest Tools Github
  53. Pentest Box Tools Download
  54. Usb Pentest Tools
  55. Hacking Tools For Mac
  56. Hack Tools 2019
  57. Hacker Tools Free
  58. Tools Used For Hacking
  59. Hacker Search Tools
  60. Hacking Tools Software
  61. Usb Pentest Tools
  62. Github Hacking Tools
  63. Pentest Tools For Mac
  64. Pentest Tools Online
  65. Free Pentest Tools For Windows
  66. Best Pentesting Tools 2018
  67. Pentest Tools For Mac
  68. Best Hacking Tools 2020
  69. Pentest Tools Open Source
  70. Install Pentest Tools Ubuntu
  71. Hacker Tools For Pc
  72. Nsa Hacker Tools
  73. Easy Hack Tools
  74. Hacking Tools For Kali Linux

Critical Bug Found In WordPress Plugin For Elementor With Over A Million Installations

 


A WordPress plugin with over one million installs has been found to contain a critical vulnerability that could result in the execution of arbitrary code on compromised websites.

The plugin in question is Essential Addons for Elementor, which provides WordPress site owners with a library of over 80 elements and extensions to help design and customize pages and posts.

"This vulnerability allows any user, regardless of their authentication or authorization status, to perform a local file inclusion attack," Patchstack said in a report. "This attack can be used to include local files on the filesystem of the website, such as /etc/passwd. This can also be used to perform RCE by including a file with malicious PHP code that normally cannot be executed."

That said, the vulnerability only exists if widgets like dynamic gallery and product gallery are used, which utilize the vulnerable function, resulting in local file inclusion – an attack technique in which a web application is tricked into exposing or running arbitrary files on the webserver.

The flaw impacts all versions of the addon from 5.0.4 and below, and credited with discovering the vulnerability is researcher Wai Yan Myo Thet. Following responsible disclosure, the security hole was finally plugged in version 5.0.5 released on January 28 "after several insufficient patches."

The development comes weeks after it emerged that unidentified actors tampered with dozens of WordPress themes and plugins hosted on a developer's website to inject a backdoor with the goal of infecting further sites.

More information


  1. Hacking Tools Name
  2. Pentest Tools Alternative
  3. Pentest Tools Open Source
  4. Pentest Tools Find Subdomains
  5. Hacker Tools Windows
  6. Hack Tools Mac
  7. Hacking Tools Github
  8. Hacker Tools Apk
  9. Pentest Tools Port Scanner
  10. Kik Hack Tools
  11. Pentest Tools For Mac
  12. Pentest Tools Framework
  13. Hacker Tool Kit
  14. Pentest Tools Alternative
  15. Wifi Hacker Tools For Windows
  16. Hacker Tools For Windows
  17. How To Install Pentest Tools In Ubuntu
  18. Tools 4 Hack
  19. Hacker Tools For Pc
  20. Hacker Tools 2019
  21. Hacker Tools Free
  22. Hacking Tools Kit
  23. Easy Hack Tools
  24. Android Hack Tools Github
  25. Hacker Tools Github
  26. New Hack Tools
  27. Pentest Tools Windows
  28. Hacker Hardware Tools
  29. Wifi Hacker Tools For Windows
  30. Hack Tools Pc
  31. Hacking Tools Name
  32. Free Pentest Tools For Windows
  33. Hacking Tools Download
  34. Hacking Tools For Games
  35. Hacker Tool Kit
  36. Pentest Tools For Windows
  37. Hacking Tools Software
  38. Hacking Tools Windows
  39. Best Hacking Tools 2020
  40. Hack Tool Apk
  41. Best Pentesting Tools 2018
  42. Kik Hack Tools
  43. Pentest Tools Url Fuzzer
  44. Hacker Security Tools
  45. Hacking Tools Hardware
  46. Hacking Tools For Windows
  47. Pentest Reporting Tools
  48. Hacker Tools Apk
  49. Hacking Apps
  50. Pentest Tools Apk
  51. Pentest Tools Review
  52. Pentest Tools Linux
  53. Usb Pentest Tools
  54. Tools Used For Hacking
  55. Pentest Tools For Mac
  56. Best Hacking Tools 2020
  57. Kik Hack Tools
  58. Hacking Tools 2020
  59. Hacking Tools For Windows 7
  60. Pentest Tools Bluekeep