ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages Reviewed by Anonymous on 3:51 PM Rating: 5
Sharesniffer - Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems Sharesniffer - Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems Reviewed by Anonymous on 6:51 AM Rating: 5
Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives Reviewed by Anonymous on 3:14 AM Rating: 5
Prowler - Distributed Network Vulnerability Scanner Prowler - Distributed Network Vulnerability Scanner Reviewed by Anonymous on 3:16 PM Rating: 5
FBI issues alert over two new malware linked to Hidden Cobra hackers FBI issues alert over two new malware linked to Hidden Cobra hackers Reviewed by Anonymous on 7:53 AM Rating: 5
Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups Reviewed by Anonymous on 7:48 AM Rating: 5
Russia asks Apple to remove Telegram Messenger from the App Store Russia asks Apple to remove Telegram Messenger from the App Store Reviewed by Anonymous on 1:49 AM Rating: 5
Yahoo Hacker linked to Russian Intelligence Gets 5 Years in U.S. Prison Yahoo Hacker linked to Russian Intelligence Gets 5 Years in U.S. Prison Reviewed by Anonymous on 12:43 AM Rating: 5
Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch Reviewed by Anonymous on 3:45 PM Rating: 5
RootHelper - A Bash Script that Downloads and Unzips Scripts that will Aid with Privilege Escalation on a Linux System RootHelper - A Bash Script that Downloads and Unzips Scripts that will Aid with Privilege Escalation on a Linux System Reviewed by Anonymous on 3:09 PM Rating: 5
Lama - Tool To Obtain A Custom Password Dictionary To A Particular Target Lama - Tool To Obtain A Custom Password Dictionary To A Particular Target Reviewed by Anonymous on 7:35 AM Rating: 5
Critical RCE Flaw Discovered in Blockchain-Based EOS Smart Contract System Critical RCE Flaw Discovered in Blockchain-Based EOS Smart Contract System Reviewed by Anonymous on 2:49 AM Rating: 5
pwnedOrNot - Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API pwnedOrNot - Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API Reviewed by Anonymous on 3:47 PM Rating: 5
KillChain - A Unified Console To Perform The "Kill Chain" Stages of Attacks KillChain - A Unified Console To Perform The "Kill Chain" Stages of Attacks Reviewed by Anonymous on 2:32 PM Rating: 5
FBI: Kindly Reboot Your Router Now, Please FBI: Kindly Reboot Your Router Now, Please Reviewed by Anonymous on 12:13 PM Rating: 5
Checking Out the Most Promising Data Recovery Software Checking Out the Most Promising Data Recovery Software Reviewed by Anonymous on 8:51 AM Rating: 5
GyoiThon - A Growing Penetration Test Tool Using Machine Learning GyoiThon - A Growing Penetration Test Tool Using Machine Learning Reviewed by Anonymous on 7:13 AM Rating: 5
How to Copy a Protected Disk Correctly? How to Copy a Protected Disk Correctly? Reviewed by Anonymous on 2:15 AM Rating: 5
Researchers Defeat AMD's SEV Virtual Machine Encryption Researchers Defeat AMD's SEV Virtual Machine Encryption Reviewed by Anonymous on 1:39 AM Rating: 5
Terminator - Metasploit Payload Generator Terminator - Metasploit Payload Generator Reviewed by Anonymous on 3:39 PM Rating: 5
V3n0M - An Open Source Vulnerability Scanner V3n0M - An Open Source Vulnerability Scanner Reviewed by Anonymous on 1:35 PM Rating: 5
iOSRestrictionBruteForce v2.1.0 - Crack iOS Restriction Passcodes With Python iOSRestrictionBruteForce v2.1.0 - Crack iOS Restriction Passcodes With Python Reviewed by Anonymous on 7:53 AM Rating: 5
Burpa - A Burp Suite Automation Tool Burpa - A Burp Suite Automation Tool Reviewed by Anonymous on 4:32 PM Rating: 5
Why Is Your Location Data No Longer Private? Why Is Your Location Data No Longer Private? Reviewed by Anonymous on 9:55 AM Rating: 5
HTTPoxyScan - HTTPoxy Exploit Scanner HTTPoxyScan - HTTPoxy Exploit Scanner Reviewed by Anonymous on 7:36 AM Rating: 5
BSQLinjector - Blind SQL Injection Exploitation Tool BSQLinjector - Blind SQL Injection Exploitation Tool Reviewed by Anonymous on 5:25 AM Rating: 5
Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API Reviewed by Anonymous on 4:06 PM Rating: 5
BackdoorMe - Powerful Auto-Backdooring Utility BackdoorMe - Powerful Auto-Backdooring Utility Reviewed by Anonymous on 10:42 AM Rating: 5
Sn1per v4.4 - Automated Pentest Recon Scanner Sn1per v4.4 - Automated Pentest Recon Scanner Reviewed by Anonymous on 7:18 AM Rating: 5
Z-Wave Downgrade Attack Left Over 100 Million IoT Devices Open to Hackers Z-Wave Downgrade Attack Left Over 100 Million IoT Devices Open to Hackers Reviewed by Anonymous on 2:36 AM Rating: 5
Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Reviewed by Anonymous on 3:43 PM Rating: 5
Hackazon - A Modern Vulnerable Web App Hackazon - A Modern Vulnerable Web App Reviewed by Anonymous on 2:29 PM Rating: 5
3 Charged In Fatal Kansas ‘Swatting’ Attack 3 Charged In Fatal Kansas ‘Swatting’ Attack Reviewed by Anonymous on 11:08 AM Rating: 5
Pornhub launches VPNhub – a free and unlimited VPN service Pornhub launches VPNhub – a free and unlimited VPN service Reviewed by Anonymous on 9:40 AM Rating: 5
Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing Reviewed by Anonymous on 7:47 AM Rating: 5
Maltrail - Malicious Traffic Detection System Maltrail - Malicious Traffic Detection System Reviewed by Anonymous on 7:30 AM Rating: 5
Here's How to Download All the Data Apple Collects About You Here's How to Download All the Data Apple Collects About You Reviewed by Anonymous on 4:15 AM Rating: 5
FBI seizes control of a massive botnet that infected over 500,000 routers FBI seizes control of a massive botnet that infected over 500,000 routers Reviewed by Anonymous on 3:17 AM Rating: 5
Galileo - Web Application Audit Framework Galileo - Web Application Audit Framework Reviewed by Anonymous on 3:28 PM Rating: 5
Researchers unearth a huge botnet army of 500,000 hacked routers Researchers unearth a huge botnet army of 500,000 hacked routers Reviewed by Anonymous on 9:06 AM Rating: 5
Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers Reviewed by Anonymous on 7:50 AM Rating: 5
Learn Network Attacks and Security - FLAT 75% OFF Learn Network Attacks and Security - FLAT 75% OFF Reviewed by Anonymous on 6:12 AM Rating: 5
Hackers are exploiting a new zero-day flaw in GPON routers Hackers are exploiting a new zero-day flaw in GPON routers Reviewed by Anonymous on 2:32 AM Rating: 5
Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars Reviewed by Anonymous on 11:53 PM Rating: 5
Acunetix v12 - More Comprehensive, More Accurate and now 2X Faster Acunetix v12 - More Comprehensive, More Accurate and now 2X Faster Reviewed by Anonymous on 3:08 PM Rating: 5
Mobile Giants: Please Don’t Share the Where Mobile Giants: Please Don’t Share the Where Reviewed by Anonymous on 9:24 AM Rating: 5
Cloud Ethical Hacking: Learn How to Use Kali Linux on Amazon AWS Cloud Ethical Hacking: Learn How to Use Kali Linux on Amazon AWS Reviewed by Anonymous on 7:56 AM Rating: 5
Parrot Security 4.0 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Parrot Security 4.0 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Reviewed by Anonymous on 7:20 AM Rating: 5
Acunetix v12: More Comprehensive, More Accurate and now 2X Faster Acunetix v12: More Comprehensive, More Accurate and now 2X Faster Reviewed by Anonymous on 6:43 AM Rating: 5
New Spectre (Variant 4) CPU Flaw Discovered—Intel, ARM, AMD Affected New Spectre (Variant 4) CPU Flaw Discovered—Intel, ARM, AMD Affected Reviewed by Anonymous on 6:38 AM Rating: 5
EternalView - All In One Basic Information Gathering And Vulnerability Assessment Tool EternalView - All In One Basic Information Gathering And Vulnerability Assessment Tool Reviewed by Anonymous on 4:01 PM Rating: 5
DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide Reviewed by Anonymous on 8:01 AM Rating: 5
Airpydump - Analyze Wireless Packets On The Fly. Currently Supporting Three Working Modes (Reader, Live, Stealth) Airpydump - Analyze Wireless Packets On The Fly. Currently Supporting Three Working Modes (Reader, Live, Stealth) Reviewed by Anonymous on 6:34 AM Rating: 5