Social Recon - Investigate The Online Presence And Footprint Of Someone Social Recon - Investigate The Online Presence And Footprint Of Someone Reviewed by Anonymous on 12:44 PM Rating: 5
Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems Reviewed by Anonymous on 8:05 AM Rating: 5
Update Your Firefox Browser to Fix a Critical Remotely Exploitable Flaw Update Your Firefox Browser to Fix a Critical Remotely Exploitable Flaw Reviewed by Anonymous on 6:24 AM Rating: 5
SocialFish - Ultimate phishing tool with Ngrok integrated SocialFish - Ultimate phishing tool with Ngrok integrated Reviewed by Anonymous on 5:15 AM Rating: 5
Snitch - Information Gathering via Dorks Snitch - Information Gathering via Dorks Reviewed by Anonymous on 12:35 AM Rating: 5
lanGhost - A LAN dropbox chatbot controllable via Telegram lanGhost - A LAN dropbox chatbot controllable via Telegram Reviewed by Anonymous on 12:17 PM Rating: 5
Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US Reviewed by Anonymous on 9:38 AM Rating: 5
Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Reviewed by Anonymous on 5:37 AM Rating: 5
Cowrie - SSH/Telnet Honeypot Cowrie - SSH/Telnet Honeypot Reviewed by Anonymous on 12:41 AM Rating: 5
Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Reviewed by Anonymous on 2:07 PM Rating: 5
Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases Reviewed by Anonymous on 7:48 AM Rating: 5
File Your Taxes Before Scammers Do It For You File Your Taxes Before Scammers Do It For You Reviewed by Anonymous on 7:06 AM Rating: 5
Ethical Hacking with Android: Master Class Ethical Hacking with Android: Master Class Reviewed by Anonymous on 6:49 AM Rating: 5
Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner Reviewed by Anonymous on 6:04 AM Rating: 5
Injectify - Perform Advanced MiTM Attacks On Websites With Ease Injectify - Perform Advanced MiTM Attacks On Websites With Ease Reviewed by Anonymous on 5:20 AM Rating: 5
Nearly 2000 WordPress Websites Infected with a Keylogger Nearly 2000 WordPress Websites Infected with a Keylogger Reviewed by Anonymous on 4:46 AM Rating: 5
Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) Reviewed by Anonymous on 1:43 AM Rating: 5
AntiCuckoo - A Tool To Detect & Crash Cuckoo Sandbox AntiCuckoo - A Tool To Detect & Crash Cuckoo Sandbox Reviewed by Anonymous on 1:20 AM Rating: 5
Digital Forensics Investigation using OS Forensics (Part1) Digital Forensics Investigation using OS Forensics (Part1) Reviewed by Anonymous on 11:22 PM Rating: 5
DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker Reviewed by Anonymous on 1:47 PM Rating: 5
Manual Post Exploitation on Windows PC (System Command) Manual Post Exploitation on Windows PC (System Command) Reviewed by Anonymous on 9:38 AM Rating: 5
Infoga - Email Information Gathering Infoga - Email Information Gathering Reviewed by Anonymous on 5:44 AM Rating: 5
usbkill - An Anti-Forensic Kill Switch usbkill - An Anti-Forensic Kill Switch Reviewed by Anonymous on 12:27 AM Rating: 5
Twebit - Bitcoin Analysis in Twitter With Machine Learning Twebit - Bitcoin Analysis in Twitter With Machine Learning Reviewed by Anonymous on 1:32 PM Rating: 5
First ‘Jackpotting’ Attacks Hit U.S. ATMs First ‘Jackpotting’ Attacks Hit U.S. ATMs Reviewed by Anonymous on 11:09 AM Rating: 5
SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages Reviewed by Anonymous on 5:40 AM Rating: 5
poet - A Simple Post-Exploitation Tool poet - A Simple Post-Exploitation Tool Reviewed by Anonymous on 4:34 PM Rating: 5
Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Reviewed by Anonymous on 1:28 PM Rating: 5
Registered at SSA.GOV? Good for You, But Keep Your Guard Up Registered at SSA.GOV? Good for You, But Keep Your Guard Up Reviewed by Anonymous on 11:55 AM Rating: 5
Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange Reviewed by Anonymous on 11:20 AM Rating: 5
Wavecrack - Web Interface For Password Cracking With Hashcat Wavecrack - Web Interface For Password Cracking With Hashcat Reviewed by Anonymous on 5:06 AM Rating: 5
VBScan - VBulletin Vulnerability Scanner VBScan - VBulletin Vulnerability Scanner Reviewed by Anonymous on 12:29 AM Rating: 5
Hack the USV: 2017 (CTF Challenge) Hack the USV: 2017 (CTF Challenge) Reviewed by Anonymous on 9:44 PM Rating: 5
Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Reviewed by Anonymous on 1:20 PM Rating: 5
Forensic Imaging through Encase Imager Forensic Imaging through Encase Imager Reviewed by Anonymous on 8:50 AM Rating: 5
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Reviewed by Anonymous on 5:38 AM Rating: 5
Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems Reviewed by Anonymous on 4:44 AM Rating: 5
Gcat - A Fully Featured Backdoor That Uses Gmail As a C&C Server Gcat - A Fully Featured Backdoor That Uses Gmail As a C&C Server Reviewed by Anonymous on 1:51 AM Rating: 5
Yikes! Three armed men tried to rob a Bitcoin Exchange in Canada Yikes! Three armed men tried to rob a Bitcoin Exchange in Canada Reviewed by Anonymous on 1:26 AM Rating: 5
EU Antitrust Regulators Fine Qualcomm $1.2 Billion Over Apple Deal EU Antitrust Regulators Fine Qualcomm $1.2 Billion Over Apple Deal Reviewed by Anonymous on 1:00 AM Rating: 5
Chronicle: A Meteor Aimed At Planet Threat Intel? Chronicle: A Meteor Aimed At Planet Threat Intel? Reviewed by Anonymous on 3:11 PM Rating: 5
Pupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Pupy -  Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Reviewed by Anonymous on 1:30 PM Rating: 5
Expert: IoT Botnets the Work of a ‘Vast Minority’ Expert: IoT Botnets the Work of a ‘Vast Minority’ Reviewed by Anonymous on 8:08 AM Rating: 5
rbndr - Simple DNS Rebinding Service rbndr - Simple DNS Rebinding Service Reviewed by Anonymous on 5:14 AM Rating: 5
Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework Reviewed by Anonymous on 4:27 AM Rating: 5
Burpsuite Encoder & Decoder Tutorial Burpsuite Encoder & Decoder Tutorial Reviewed by Anonymous on 1:14 AM Rating: 5
CUPP - Common User Passwords Profiler CUPP - Common User Passwords Profiler Reviewed by Anonymous on 11:39 PM Rating: 5
Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Reviewed by Anonymous on 12:38 PM Rating: 5
Cybersecurity Certification Courses – CISA, CISM, CISSP Cybersecurity Certification Courses – CISA, CISM, CISSP Reviewed by Anonymous on 5:55 AM Rating: 5
Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Reviewed by Anonymous on 5:39 AM Rating: 5
Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches Reviewed by Anonymous on 3:55 AM Rating: 5