D-Link Password Decryptor - Tool for Recovering Passwords from D-Link Modems/Routers D-Link Password Decryptor - Tool for Recovering Passwords from D-Link Modems/Routers Reviewed by Anonymous on 8:13 PM Rating: 5
RedLogin - SSH Brute-force Tools RedLogin - SSH Brute-force Tools Reviewed by Anonymous on 1:14 PM Rating: 5
DOS Attack with Packet Crafting using Colasoft DOS Attack with Packet Crafting using Colasoft Reviewed by Anonymous on 7:25 AM Rating: 5
Watcher - A Passive Web Application Vulnerability Scanner Watcher - A Passive Web Application Vulnerability Scanner Reviewed by Anonymous on 5:55 AM Rating: 5
Lynis 2.5.8 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.8 - Security Auditing Tool for Unix/Linux Systems Reviewed by Anonymous on 5:50 AM Rating: 5
Packet Crafting with Colasoft Packet Builder Packet Crafting with Colasoft Packet Builder Reviewed by Anonymous on 11:47 PM Rating: 5
Woodpecker hash Bruteforce - A Powerful Hash Cracker Woodpecker hash Bruteforce - A Powerful Hash Cracker Reviewed by Anonymous on 11:42 PM Rating: 5
Crips - IP Tools To quickly get information about IP Address's, Web Pages and DNS records Crips - IP Tools To quickly get information about IP Address's, Web Pages and DNS records Reviewed by Anonymous on 1:26 PM Rating: 5
BlueMaho v090417 - Bluetooth Security Testing Suite BlueMaho v090417 - Bluetooth Security Testing Suite Reviewed by Anonymous on 5:37 AM Rating: 5
Commix - Automated Command Injection and Exploitation Tool Commix - Automated Command Injection and Exploitation Tool Reviewed by Anonymous on 8:55 PM Rating: 5
Fsociety Hacking Tools Pack - A Penetration Testing Framework Fsociety Hacking Tools Pack - A Penetration Testing Framework Reviewed by Anonymous on 1:55 PM Rating: 5
Kansas Man Killed In ‘SWATting’ Attack Kansas Man Killed In ‘SWATting’ Attack Reviewed by Anonymous on 1:31 PM Rating: 5
DHCP Penetration Testing DHCP Penetration Testing Reviewed by Anonymous on 8:43 AM Rating: 5
Merlin - A cross-platform post-exploitation HTTP/2 Command & Control server and agent Merlin - A cross-platform post-exploitation HTTP/2 Command & Control server and agent Reviewed by Anonymous on 5:41 AM Rating: 5
Critical "Same Origin Policy" Bypass Flaw Found in Samsung Android Browser Critical "Same Origin Policy" Bypass Flaw Found in Samsung Android Browser Reviewed by Anonymous on 4:32 AM Rating: 5
Kadimus - Local File Inclusion (LFI) Scan & Exploit Tool Kadimus - Local File Inclusion (LFI) Scan & Exploit Tool Reviewed by Anonymous on 1:40 AM Rating: 5
Two Romanians Charged With Hacking Police CCTV Cameras Before Trump Inauguration Two Romanians Charged With Hacking Police CCTV Cameras Before Trump Inauguration Reviewed by Anonymous on 12:36 AM Rating: 5
WPHardening v1.6 - Fortify the security of any WordPress installation WPHardening v1.6 - Fortify the security of any WordPress installation Reviewed by Anonymous on 1:41 PM Rating: 5
4 Years After Target, the Little Guy is the Target 4 Years After Target, the Little Guy is the Target Reviewed by Anonymous on 8:05 AM Rating: 5
PiKarma - Detects Wireless Network Attacks PiKarma - Detects Wireless Network Attacks Reviewed by Anonymous on 5:42 AM Rating: 5
CEO of Major UK-Based Cryptocurrency Exchange Kidnapped in Ukraine CEO of Major UK-Based Cryptocurrency Exchange Kidnapped in Ukraine Reviewed by Anonymous on 1:51 AM Rating: 5
WiFi-Pumpkin - Framework for Rogue WiFi Access Point Attack WiFi-Pumpkin - Framework for Rogue WiFi Access Point Attack Reviewed by Anonymous on 10:36 PM Rating: 5
Relayer - SMB Relay Attack Script Relayer - SMB Relay Attack Script Reviewed by Anonymous on 1:39 PM Rating: 5
Kernel Exploit for Sony PS4 Firmware 4.05 Released, Jailbreak Coming Soon Kernel Exploit for Sony PS4 Firmware 4.05 Released, Jailbreak Coming Soon Reviewed by Anonymous on 9:31 AM Rating: 5
WPScan - A WordPress Vulnerability Scanner WPScan - A WordPress Vulnerability Scanner Reviewed by Anonymous on 7:29 AM Rating: 5
Qubes OS - A Security-Oriented Operating System Qubes OS - A Security-Oriented Operating System Reviewed by Anonymous on 5:25 AM Rating: 5
WiFiJammer - Tool For Jamming All WiFi Clients/Routers WiFiJammer - Tool For Jamming All WiFi Clients/Routers Reviewed by Anonymous on 7:50 PM Rating: 5
Username Anarchy - Username Tools For Penetration Testing Username Anarchy - Username Tools For Penetration Testing Reviewed by Anonymous on 1:51 PM Rating: 5
DOS Attack Penetration Testing (Part 2) DOS Attack Penetration Testing (Part 2) Reviewed by Anonymous on 8:42 AM Rating: 5
Skyrocketing Bitcoin Fees Hit Carders in Wallet Skyrocketing Bitcoin Fees Hit Carders in Wallet Reviewed by Anonymous on 7:19 AM Rating: 5
BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) Reviewed by Anonymous on 5:39 AM Rating: 5
Top 5 Anti-Viruses of 2017 Top 5 Anti-Viruses of 2017 Reviewed by Anonymous on 5:24 AM Rating: 5
SubBrute - A Subdomain Brute Forcer SubBrute - A Subdomain Brute Forcer Reviewed by Anonymous on 9:41 PM Rating: 5
GOSINT - Open Source Threat Intelligence Gathering and Processing Framework GOSINT - Open Source Threat Intelligence Gathering and Processing Framework Reviewed by Anonymous on 1:20 PM Rating: 5
BtleJuice Framework - Bluetooth Smart (LE) Man-in-the-Middle Framework BtleJuice Framework - Bluetooth Smart (LE) Man-in-the-Middle Framework Reviewed by Anonymous on 5:47 AM Rating: 5
CMSmap - Open Source CMS Scanner CMSmap - Open Source CMS Scanner Reviewed by Anonymous on 8:08 PM Rating: 5
Bluepot - Bluetooth Honeypot Bluepot - Bluetooth Honeypot Reviewed by Anonymous on 1:16 PM Rating: 5
DOS Penetration Testing (Part 1) DOS Penetration Testing (Part 1) Reviewed by Anonymous on 10:54 AM Rating: 5
Invoke-PSImage - Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute Invoke-PSImage - Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute Reviewed by Anonymous on 5:44 AM Rating: 5
PackETH - Ethernet Packet Generator PackETH - Ethernet Packet Generator Reviewed by Anonymous on 9:59 PM Rating: 5
certstreamcatcher - Catching phishing by observing certificate transparency logs certstreamcatcher - Catching phishing by observing certificate transparency logs Reviewed by Anonymous on 1:17 PM Rating: 5
dnscrypt-autoinstall - Automatic installation and configuration of DNSCrypt dnscrypt-autoinstall - Automatic installation and configuration of DNSCrypt Reviewed by Anonymous on 5:39 AM Rating: 5
NSEarch - Nmap Script Engine Search NSEarch -  Nmap Script Engine Search Reviewed by Anonymous on 4:34 AM Rating: 5
Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers Reviewed by Anonymous on 12:48 AM Rating: 5
ReverShellGenerator - A Tool to Generate Various Ways to Do a Reverse Shell ReverShellGenerator - A Tool to Generate Various Ways to Do a Reverse Shell Reviewed by Anonymous on 2:06 PM Rating: 5
Chinese Man Gets 5-Year Prison for Running 'Unauthorized' VPN Service Chinese Man Gets 5-Year Prison for Running 'Unauthorized' VPN Service Reviewed by Anonymous on 8:49 AM Rating: 5
How to Detect NMAP Scan Using Snort How to Detect NMAP Scan Using Snort Reviewed by Anonymous on 6:46 AM Rating: 5
XAttacker - Website Vulnerability Scanner & Auto Exploiter XAttacker - Website Vulnerability Scanner & Auto Exploiter Reviewed by Anonymous on 5:52 AM Rating: 5
Cyber Security Tips of the Day Cyber Security Tips of the Day Reviewed by Anonymous on 4:39 AM Rating: 5
Beware of Cryptocurrency Mining Virus Spreading Through Facebook Messenger Beware of Cryptocurrency Mining Virus Spreading Through Facebook Messenger Reviewed by Anonymous on 12:35 AM Rating: 5
Nissan Finance Canada Suffers Data Breach — Notifies 1.13 Million Customers Nissan Finance Canada Suffers Data Breach — Notifies 1.13 Million Customers Reviewed by Anonymous on 10:21 PM Rating: 5
Pupy - A Cross-platform Remote Administration and Post-Exploitation Tool Pupy - A Cross-platform Remote Administration and Post-Exploitation Tool Reviewed by Anonymous on 10:04 PM Rating: 5
GhostInTheNet - Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan GhostInTheNet - Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan Reviewed by Anonymous on 12:55 PM Rating: 5
Apple Admits Deliberately Slowing Older iPhones — Here’s Why Apple Admits Deliberately Slowing Older iPhones — Here’s Why Reviewed by Anonymous on 8:24 AM Rating: 5
Hackers Targeting Servers Running Database Services for Mining Cryptocurrency Hackers Targeting Servers Running Database Services for Mining Cryptocurrency Reviewed by Anonymous on 7:11 AM Rating: 5
U.K. Man Avoids Jail Time in vDOS Case U.K. Man Avoids Jail Time in vDOS Case Reviewed by Anonymous on 6:16 AM Rating: 5
NoSQL Exploitation Framework 2.0 - A Framework For NoSQL Scanning and Exploitation NoSQL Exploitation Framework 2.0 - A Framework For NoSQL Scanning and Exploitation Reviewed by Anonymous on 5:31 AM Rating: 5
The LaZagne Project - Tool To Retrieve the Passwords Stored On a Local Computer The LaZagne Project - Tool To Retrieve the Passwords Stored On a Local Computer Reviewed by Anonymous on 9:56 PM Rating: 5