Prithvi - A Report Generation Tool For Security Assessment Prithvi - A Report Generation Tool For Security Assessment Reviewed by Anonymous on 1:33 PM Rating: 5
Apple Moves iCloud Data and Encryption Keys for Chinese Users to China Apple Moves iCloud Data and Encryption Keys for Chinese Users to China Reviewed by Anonymous on 8:16 AM Rating: 5
How to Fight Mobile Number Port-out Scams How to Fight Mobile Number Port-out Scams Reviewed by Anonymous on 7:06 AM Rating: 5
A Simple Bug Revealed Admins of Facebook Pages — Find Out How A Simple Bug Revealed Admins of Facebook Pages — Find Out How Reviewed by Anonymous on 6:39 AM Rating: 5
Ninja Shell - Port Knocking Technique With AES256-GCM Ninja Shell - Port Knocking Technique With AES256-GCM Reviewed by Anonymous on 5:28 AM Rating: 5
Memcached Servers Abused for Massive Amplification DDoS Attacks Memcached Servers Abused for Massive Amplification DDoS Attacks Reviewed by Anonymous on 11:01 PM Rating: 5
Gryffin - Web Security Scanning Platform Gryffin - Web Security Scanning Platform Reviewed by Anonymous on 10:23 PM Rating: 5
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Reviewed by Anonymous on 1:15 PM Rating: 5
Bot Roundup: Avalanche, Kronos, NanoCore Bot Roundup: Avalanche, Kronos, NanoCore Reviewed by Anonymous on 11:23 AM Rating: 5
WAScan - Web Application Scanner WAScan - Web Application Scanner Reviewed by Anonymous on 5:18 AM Rating: 5
Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence Reviewed by Anonymous on 4:39 AM Rating: 5
Phone-Cracking Firm Found a Way to Unlock Any iPhone Model Phone-Cracking Firm Found a Way to Unlock Any iPhone Model Reviewed by Anonymous on 11:20 PM Rating: 5
Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes Reviewed by Anonymous on 1:14 PM Rating: 5
USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online Reviewed by Anonymous on 11:52 AM Rating: 5
Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely Reviewed by Anonymous on 7:42 AM Rating: 5
PoT - Phishing On Twitter PoT - Phishing On Twitter Reviewed by Anonymous on 5:31 AM Rating: 5
Android P Will Block Background Apps from Accessing Your Camera, Microphone Android P Will Block Background Apps from Accessing Your Camera, Microphone Reviewed by Anonymous on 12:46 AM Rating: 5
DNSteal - DNS Exfiltration Tool for Stealthily Sending Files Over DNS Requests DNSteal - DNS Exfiltration Tool for Stealthily Sending Files Over DNS Requests Reviewed by Anonymous on 10:00 PM Rating: 5
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network Reviewed by Anonymous on 1:44 PM Rating: 5
contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities Reviewed by Anonymous on 5:33 AM Rating: 5
Sn1per - Automated Pentest Recon Scanner Sn1per - Automated Pentest Recon Scanner Reviewed by Anonymous on 12:04 AM Rating: 5
meg+ - Automated Reconnaissance Wrapper meg+ - Automated Reconnaissance Wrapper Reviewed by Anonymous on 1:35 PM Rating: 5
Droopescan - Plugin Based CMS Security Scanner Droopescan - Plugin Based CMS Security Scanner Reviewed by Anonymous on 7:36 AM Rating: 5
meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) Reviewed by Anonymous on 5:29 AM Rating: 5
Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Reviewed by Anonymous on 12:57 PM Rating: 5
Total Network Inventory 3: Keep Your Network Updated! Total Network Inventory 3: Keep Your Network Updated! Reviewed by Anonymous on 7:11 AM Rating: 5
Invoke-Obfuscation - PowerShell Obfuscator Invoke-Obfuscation - PowerShell Obfuscator Reviewed by Anonymous on 5:18 AM Rating: 5
Sonar.js - A Framework for Identifying and Launching Exploits Against Internal Network Hosts Sonar.js - A Framework for Identifying and Launching Exploits Against Internal Network Hosts Reviewed by Anonymous on 1:17 AM Rating: 5
Chase ‘Glitch’ Exposed Customer Accounts Chase ‘Glitch’ Exposed Customer Accounts Reviewed by Anonymous on 5:01 PM Rating: 5
Mitm6 - Pwning IPv4 Via IPv6 Mitm6 - Pwning IPv4 Via IPv6 Reviewed by Anonymous on 12:18 PM Rating: 5
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies Reviewed by Anonymous on 5:23 AM Rating: 5
Intrigue-core - Framework for Automated Attack Surface Discovery Intrigue-core - Framework for Automated Attack Surface Discovery Reviewed by Anonymous on 9:34 PM Rating: 5
BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website Reviewed by Anonymous on 12:57 PM Rating: 5
Findsploit - Find Exploits In Local And Online Databases Instantly Findsploit - Find Exploits In Local And Online Databases Instantly Reviewed by Anonymous on 5:44 AM Rating: 5
Empire - PowerShell and Python Post-Exploitation Agent Empire - PowerShell and Python Post-Exploitation Agent Reviewed by Anonymous on 11:40 PM Rating: 5
MADLIRA - Malware detection using learning and information retrieval for Android MADLIRA - Malware detection using learning and information retrieval for Android Reviewed by Anonymous on 12:58 PM Rating: 5
The 26 Hour Complete JavaScript Developer Course - Beginner to Advanced The 26 Hour Complete JavaScript Developer Course - Beginner to Advanced Reviewed by Anonymous on 8:10 AM Rating: 5
Disadvantages of Open Source eCommerce Software Disadvantages of Open Source eCommerce Software Reviewed by Anonymous on 8:06 AM Rating: 5
Learn Man in the Middle Attack From Scratch Learn Man in the Middle Attack From Scratch Reviewed by Anonymous on 6:04 AM Rating: 5
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities Reviewed by Anonymous on 4:56 AM Rating: 5
Money Laundering Via Author Impersonation on Amazon? Money Laundering Via Author Impersonation on Amazon? Reviewed by Anonymous on 4:08 AM Rating: 5
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking Reviewed by Anonymous on 1:55 PM Rating: 5
IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts Reviewed by Anonymous on 6:58 AM Rating: 5
Gobuster - Directory/File & DNS Busting Tool Written In Go Gobuster - Directory/File & DNS Busting Tool Written In Go Reviewed by Anonymous on 4:46 AM Rating: 5
AutoBrowser - Create Report and Screenshots of HTTP/S Based Ports on the Network AutoBrowser - Create Report and Screenshots of HTTP/S Based Ports on the Network Reviewed by Anonymous on 12:53 AM Rating: 5
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Reviewed by Anonymous on 1:32 PM Rating: 5
PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram Reviewed by Anonymous on 5:43 AM Rating: 5
sshLooter - Script To Steal Passwords From SSH sshLooter - Script To Steal Passwords From SSH Reviewed by Anonymous on 1:34 PM Rating: 5
ezsploit - Linux Bash Script Automation For Metasploit ezsploit - Linux Bash Script Automation For Metasploit Reviewed by Anonymous on 5:48 AM Rating: 5