Prithvi - A Report Generation Tool For Security Assessment
Reviewed by
Anonymous
on
1:33 PM
Rating:
5
Apple Moves iCloud Data and Encryption Keys for Chinese Users to China
Reviewed by
Anonymous
on
8:16 AM
Rating:
5
How to Fight Mobile Number Port-out Scams
Reviewed by
Anonymous
on
7:06 AM
Rating:
5
A Simple Bug Revealed Admins of Facebook Pages — Find Out How
Reviewed by
Anonymous
on
6:39 AM
Rating:
5
Ninja Shell - Port Knocking Technique With AES256-GCM
Reviewed by
Anonymous
on
5:28 AM
Rating:
5
Memcached Servers Abused for Massive Amplification DDoS Attacks
Reviewed by
Anonymous
on
11:01 PM
Rating:
5
Gryffin - Web Security Scanning Platform
Reviewed by
Anonymous
on
10:23 PM
Rating:
5
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition
Reviewed by
Anonymous
on
1:15 PM
Rating:
5
Bot Roundup: Avalanche, Kronos, NanoCore
Reviewed by
Anonymous
on
11:23 AM
Rating:
5
WAScan - Web Application Scanner
Reviewed by
Anonymous
on
5:18 AM
Rating:
5
Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence
Reviewed by
Anonymous
on
4:39 AM
Rating:
5
Phone-Cracking Firm Found a Way to Unlock Any iPhone Model
Reviewed by
Anonymous
on
11:20 PM
Rating:
5
Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes
Reviewed by
Anonymous
on
1:14 PM
Rating:
5
USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online
Reviewed by
Anonymous
on
11:52 AM
Rating:
5
Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely
Reviewed by
Anonymous
on
7:42 AM
Rating:
5
PoT - Phishing On Twitter
Reviewed by
Anonymous
on
5:31 AM
Rating:
5
Android P Will Block Background Apps from Accessing Your Camera, Microphone
Reviewed by
Anonymous
on
12:46 AM
Rating:
5
DNSteal - DNS Exfiltration Tool for Stealthily Sending Files Over DNS Requests
Reviewed by
Anonymous
on
10:00 PM
Rating:
5
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network
Reviewed by
Anonymous
on
1:44 PM
Rating:
5
contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities
Reviewed by
Anonymous
on
5:33 AM
Rating:
5
Sn1per - Automated Pentest Recon Scanner
Reviewed by
Anonymous
on
12:04 AM
Rating:
5
meg+ - Automated Reconnaissance Wrapper
Reviewed by
Anonymous
on
1:35 PM
Rating:
5
Droopescan - Plugin Based CMS Security Scanner
Reviewed by
Anonymous
on
7:36 AM
Rating:
5
meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts)
Reviewed by
Anonymous
on
5:29 AM
Rating:
5
Revoke-Obfuscation - PowerShell Obfuscation Detection Framework
Reviewed by
Anonymous
on
12:57 PM
Rating:
5
Total Network Inventory 3: Keep Your Network Updated!
Reviewed by
Anonymous
on
7:11 AM
Rating:
5
Invoke-Obfuscation - PowerShell Obfuscator
Reviewed by
Anonymous
on
5:18 AM
Rating:
5
Sonar.js - A Framework for Identifying and Launching Exploits Against Internal Network Hosts
Reviewed by
Anonymous
on
1:17 AM
Rating:
5
Chase ‘Glitch’ Exposed Customer Accounts
Reviewed by
Anonymous
on
5:01 PM
Rating:
5
Mitm6 - Pwning IPv4 Via IPv6
Reviewed by
Anonymous
on
12:18 PM
Rating:
5
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies
Reviewed by
Anonymous
on
5:23 AM
Rating:
5
Intrigue-core - Framework for Automated Attack Surface Discovery
Reviewed by
Anonymous
on
9:34 PM
Rating:
5
BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website
Reviewed by
Anonymous
on
12:57 PM
Rating:
5
Findsploit - Find Exploits In Local And Online Databases Instantly
Reviewed by
Anonymous
on
5:44 AM
Rating:
5
Empire - PowerShell and Python Post-Exploitation Agent
Reviewed by
Anonymous
on
11:40 PM
Rating:
5
MADLIRA - Malware detection using learning and information retrieval for Android
Reviewed by
Anonymous
on
12:58 PM
Rating:
5
The 26 Hour Complete JavaScript Developer Course - Beginner to Advanced
Reviewed by
Anonymous
on
8:10 AM
Rating:
5
Disadvantages of Open Source eCommerce Software
Reviewed by
Anonymous
on
8:06 AM
Rating:
5
Learn Man in the Middle Attack From Scratch
Reviewed by
Anonymous
on
6:04 AM
Rating:
5
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities
Reviewed by
Anonymous
on
4:56 AM
Rating:
5
Money Laundering Via Author Impersonation on Amazon?
Reviewed by
Anonymous
on
4:08 AM
Rating:
5
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking
Reviewed by
Anonymous
on
1:55 PM
Rating:
5
IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts
Reviewed by
Anonymous
on
6:58 AM
Rating:
5
Gobuster - Directory/File & DNS Busting Tool Written In Go
Reviewed by
Anonymous
on
4:46 AM
Rating:
5
AutoBrowser - Create Report and Screenshots of HTTP/S Based Ports on the Network
Reviewed by
Anonymous
on
12:53 AM
Rating:
5
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP
Reviewed by
Anonymous
on
1:32 PM
Rating:
5
PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram
Reviewed by
Anonymous
on
5:43 AM
Rating:
5
sshLooter - Script To Steal Passwords From SSH
Reviewed by
Anonymous
on
1:34 PM
Rating:
5
ezsploit - Linux Bash Script Automation For Metasploit
Reviewed by
Anonymous
on
5:48 AM
Rating:
5