Prithvi - A Report Generation Tool For Security Assessment
Reviewed by Anonymous
on
1:33 PM
Rating:
Apple Moves iCloud Data and Encryption Keys for Chinese Users to China
Reviewed by Anonymous
on
8:16 AM
Rating: 5
How to Fight Mobile Number Port-out Scams
Reviewed by Anonymous
on
7:06 AM
Rating: 5
A Simple Bug Revealed Admins of Facebook Pages — Find Out How
Reviewed by Anonymous
on
6:39 AM
Rating: 5
Ninja Shell - Port Knocking Technique With AES256-GCM
Reviewed by Anonymous
on
5:28 AM
Rating: 5
Memcached Servers Abused for Massive Amplification DDoS Attacks
Reviewed by Anonymous
on
11:01 PM
Rating: 5
Gryffin - Web Security Scanning Platform
Reviewed by Anonymous
on
10:23 PM
Rating: 5
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition
Reviewed by Anonymous
on
1:15 PM
Rating: 5
Bot Roundup: Avalanche, Kronos, NanoCore
Reviewed by Anonymous
on
11:23 AM
Rating: 5
WAScan - Web Application Scanner
Reviewed by Anonymous
on
5:18 AM
Rating: 5
Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence
Reviewed by Anonymous
on
4:39 AM
Rating: 5
Phone-Cracking Firm Found a Way to Unlock Any iPhone Model
Reviewed by Anonymous
on
11:20 PM
Rating: 5
Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes
Reviewed by Anonymous
on
1:14 PM
Rating: 5
USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online
Reviewed by Anonymous
on
11:52 AM
Rating: 5
Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely
Reviewed by Anonymous
on
7:42 AM
Rating: 5
PoT - Phishing On Twitter
Reviewed by Anonymous
on
5:31 AM
Rating: 5
Android P Will Block Background Apps from Accessing Your Camera, Microphone
Reviewed by Anonymous
on
12:46 AM
Rating: 5
DNSteal - DNS Exfiltration Tool for Stealthily Sending Files Over DNS Requests
Reviewed by Anonymous
on
10:00 PM
Rating: 5
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network
Reviewed by Anonymous
on
1:44 PM
Rating: 5
contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities
Reviewed by Anonymous
on
5:33 AM
Rating: 5
Sn1per - Automated Pentest Recon Scanner
Reviewed by Anonymous
on
12:04 AM
Rating: 5
meg+ - Automated Reconnaissance Wrapper
Reviewed by Anonymous
on
1:35 PM
Rating: 5
Droopescan - Plugin Based CMS Security Scanner
Reviewed by Anonymous
on
7:36 AM
Rating: 5
meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts)
Reviewed by Anonymous
on
5:29 AM
Rating: 5
Revoke-Obfuscation - PowerShell Obfuscation Detection Framework
Reviewed by Anonymous
on
12:57 PM
Rating: 5
Total Network Inventory 3: Keep Your Network Updated!
Reviewed by Anonymous
on
7:11 AM
Rating: 5
Invoke-Obfuscation - PowerShell Obfuscator
Reviewed by Anonymous
on
5:18 AM
Rating: 5
Sonar.js - A Framework for Identifying and Launching Exploits Against Internal Network Hosts
Reviewed by Anonymous
on
1:17 AM
Rating: 5
Chase ‘Glitch’ Exposed Customer Accounts
Reviewed by Anonymous
on
5:01 PM
Rating: 5
Mitm6 - Pwning IPv4 Via IPv6
Reviewed by Anonymous
on
12:18 PM
Rating: 5
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies
Reviewed by Anonymous
on
5:23 AM
Rating: 5
Intrigue-core - Framework for Automated Attack Surface Discovery
Reviewed by Anonymous
on
9:34 PM
Rating: 5
BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website
Reviewed by Anonymous
on
12:57 PM
Rating: 5
Findsploit - Find Exploits In Local And Online Databases Instantly
Reviewed by Anonymous
on
5:44 AM
Rating: 5
Empire - PowerShell and Python Post-Exploitation Agent
Reviewed by Anonymous
on
11:40 PM
Rating: 5
MADLIRA - Malware detection using learning and information retrieval for Android
Reviewed by Anonymous
on
12:58 PM
Rating: 5
The 26 Hour Complete JavaScript Developer Course - Beginner to Advanced
Reviewed by Anonymous
on
8:10 AM
Rating: 5
Disadvantages of Open Source eCommerce Software
Reviewed by Anonymous
on
8:06 AM
Rating: 5
Learn Man in the Middle Attack From Scratch
Reviewed by Anonymous
on
6:04 AM
Rating: 5
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities
Reviewed by Anonymous
on
4:56 AM
Rating: 5
Money Laundering Via Author Impersonation on Amazon?
Reviewed by Anonymous
on
4:08 AM
Rating: 5
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking
Reviewed by Anonymous
on
1:55 PM
Rating: 5
IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts
Reviewed by Anonymous
on
6:58 AM
Rating: 5
Gobuster - Directory/File & DNS Busting Tool Written In Go
Reviewed by Anonymous
on
4:46 AM
Rating: 5
AutoBrowser - Create Report and Screenshots of HTTP/S Based Ports on the Network
Reviewed by Anonymous
on
12:53 AM
Rating: 5
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP
Reviewed by Anonymous
on
1:32 PM
Rating: 5
PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram
Reviewed by Anonymous
on
5:43 AM
Rating: 5
sshLooter - Script To Steal Passwords From SSH
Reviewed by Anonymous
on
1:34 PM
Rating: 5
ezsploit - Linux Bash Script Automation For Metasploit
Reviewed by Anonymous
on
5:48 AM
Rating: 5
Subscribe to:
Posts (Atom)