Understanding Redirection with Hashing and Crypto Salt (Part 2) Understanding Redirection with Hashing and Crypto Salt (Part 2) Reviewed by Dump3R H3id3gg3R on 11:42 PM Rating: 5
Amazon Web Service AWS S3 Goes Down Amazon Web Service AWS S3 Goes Down Reviewed by Dump3R H3id3gg3R on 7:45 PM Rating: 5
Understanding Redirection with Encoding Techniques (Part 1) Understanding Redirection with Encoding Techniques (Part 1) Reviewed by Dump3R H3id3gg3R on 7:26 AM Rating: 5
Chrome Password Remover - Tool To Quickly Remove Stored Login Info From Google Chrome Chrome Password Remover - Tool To Quickly Remove Stored Login Info From Google Chrome Reviewed by Dump3R H3id3gg3R on 7:20 AM Rating: 5
70+ Cyber Security Micro-Courses and Certifications To Boost Your IT Career 70+ Cyber Security Micro-Courses and Certifications To Boost Your IT Career Reviewed by Dump3R H3id3gg3R on 6:33 AM Rating: 5
OverThruster - HID Attack Payload Generator For Arduinos OverThruster - HID Attack Payload Generator For Arduinos Reviewed by Dump3R H3id3gg3R on 6:29 AM Rating: 5
Critical Flaw in ESET Antivirus Exposes Mac Users to Remote Hacking Critical Flaw in ESET Antivirus Exposes Mac Users to Remote Hacking Reviewed by Dump3R H3id3gg3R on 6:14 AM Rating: 5
SQL Injection Vulnerability Found in Wordpress Plugin SQL Injection Vulnerability Found in Wordpress Plugin Reviewed by Dump3R H3id3gg3R on 5:09 AM Rating: 5
Internet-Connected Teddy Bear Exposed Over 2 Million Voice Messages; Data Held for Ransom Internet-Connected Teddy Bear Exposed Over 2 Million Voice Messages; Data Held for Ransom Reviewed by Dump3R H3id3gg3R on 1:04 AM Rating: 5
Hashview - A Web Front-End For Password Cracking And Analytics Hashview - A Web Front-End For Password Cracking And Analytics Reviewed by Dump3R H3id3gg3R on 5:58 AM Rating: 5
BSNL Password Decryptor - Tool For Recovering BSNL Modem/Router Password BSNL Password Decryptor - Tool For Recovering BSNL Modem/Router Password Reviewed by Dump3R H3id3gg3R on 1:05 AM Rating: 5
Chrome Password Decryptor - Free Tool To Recover Stored Passwords From Google Chrome Chrome Password Decryptor - Free Tool To Recover Stored Passwords From Google Chrome Reviewed by Dump3R H3id3gg3R on 1:01 AM Rating: 5
Lynis An Open Source Security Auditing Tool For LINUX and UNIX-based Systems Lynis An Open Source Security Auditing Tool For LINUX and UNIX-based Systems Reviewed by Dump3R H3id3gg3R on 10:52 PM Rating: 5
More on Bluetooth Ingenico Overlay Skimmers More on Bluetooth Ingenico Overlay Skimmers Reviewed by Dump3R H3id3gg3R on 6:06 PM Rating: 5
WIFI Client Detection - Identify People By Assigning A Name To A Device Performing A Wireless Probe Request WIFI Client Detection - Identify People By Assigning A Name To A Device Performing A Wireless Probe Request Reviewed by Dump3R H3id3gg3R on 6:26 AM Rating: 5
crackle - Crack Bluetooth Smart (BLE) Encryption crackle - Crack Bluetooth Smart (BLE) Encryption Reviewed by Dump3R H3id3gg3R on 7:35 AM Rating: 5
Ransomware Attacks On Website Database Hit MySQL Servers Ransomware Attacks On Website Database Hit MySQL Servers Reviewed by Dump3R H3id3gg3R on 7:00 AM Rating: 5
Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability Reviewed by Dump3R H3id3gg3R on 4:27 AM Rating: 5
Browser Password Remover - Tool For Removing All Login Details From Popular Browsers Browser Password Remover - Tool For Removing All Login Details From Popular Browsers Reviewed by Dump3R H3id3gg3R on 2:33 AM Rating: 5
What is CloudBleed Vulnerability Impact What is CloudBleed Vulnerability Impact Reviewed by Dump3R H3id3gg3R on 9:10 PM Rating: 5
iPhone Robbers Try to iPhish Victims iPhone Robbers Try to iPhish Victims Reviewed by Dump3R H3id3gg3R on 1:34 PM Rating: 5
Hacker Shows How Easy It Is To Hack People While Walking Around in Public Hacker Shows How Easy It Is To Hack People While Walking Around in Public Reviewed by Dump3R H3id3gg3R on 6:31 AM Rating: 5
SPARTA - Network Infrastructure Penetration Testing Tool SPARTA - Network Infrastructure Penetration Testing Tool Reviewed by Dump3R H3id3gg3R on 6:15 AM Rating: 5
Cloudbleed: Serious Bug Exposes Sensitive Data From Sites Sitting Behind CloudFlare Cloudbleed: Serious Bug Exposes Sensitive Data From Sites Sitting Behind CloudFlare Reviewed by Dump3R H3id3gg3R on 1:53 AM Rating: 5
Hacker Who Knocked Million Routers Offline Using MIRAI Arrested at London Airport Hacker Who Knocked Million Routers Offline Using MIRAI Arrested at London Airport Reviewed by Dump3R H3id3gg3R on 10:08 AM Rating: 5
Google Achieves First-Ever Successful SHA-1 Collision Attack Google Achieves First-Ever Successful SHA-1 Collision Attack Reviewed by Dump3R H3id3gg3R on 8:22 AM Rating: 5
Lynis 2.4.3 - Security Auditing Tool for Unix/Linux Systems Lynis 2.4.3 - Security Auditing Tool for Unix/Linux Systems Reviewed by Dump3R H3id3gg3R on 6:41 AM Rating: 5
Browser Password Decryptor - Tool For Recovering Website Login Details Stored By Popular Web Browsers Browser Password Decryptor - Tool For Recovering Website Login Details Stored By Popular Web Browsers Reviewed by Dump3R H3id3gg3R on 10:04 PM Rating: 5
New Crypto-Ransomware Malware Found For MacOS User New Crypto-Ransomware Malware Found For MacOS User Reviewed by Dump3R H3id3gg3R on 9:07 PM Rating: 5
11-Year Old Linux Kernel Local Privilege Escalation Flaw Discovered 11-Year Old Linux Kernel Local Privilege Escalation Flaw Discovered Reviewed by Dump3R H3id3gg3R on 10:20 AM Rating: 5
mongoaudit - A Powerful MongoDB Auditing and Pentesting Tool mongoaudit - A Powerful MongoDB Auditing and Pentesting Tool Reviewed by Dump3R H3id3gg3R on 6:11 AM Rating: 5
National Cyber Security Lab Worth of S$8.4m launched at NUS National Cyber Security Lab Worth of S$8.4m launched at NUS Reviewed by Dump3R H3id3gg3R on 5:35 AM Rating: 5
Beware! Don't Fall For "Font Wasn't Found" Google Chrome Malware Scam Beware! Don't Fall For "Font Wasn't Found" Google Chrome Malware Scam Reviewed by Dump3R H3id3gg3R on 3:06 AM Rating: 5
Microsoft releases update for Flash Player, but leaves two disclosed Flaws Unpatched Microsoft releases update for Flash Player, but leaves two disclosed Flaws Unpatched Reviewed by Dump3R H3id3gg3R on 12:26 AM Rating: 5
Best Practices for Developing a Secure Application Best Practices for Developing a Secure Application Reviewed by Dump3R H3id3gg3R on 11:00 PM Rating: 5
How to Bury a Major Breach Notification How to Bury a Major Breach Notification Reviewed by Dump3R H3id3gg3R on 9:59 AM Rating: 5
Unpatched Python and Java Flaws Let Attackers Bypass Firewall Using FTP Protocol Injection Unpatched Python and Java Flaws Let Attackers Bypass Firewall Using FTP Protocol Injection Reviewed by Dump3R H3id3gg3R on 9:33 AM Rating: 5
BitComet Password Decryptor - Tool For Decrypting Passwords Stored By BitComet BitComet Password Decryptor - Tool For Decrypting Passwords Stored By BitComet Reviewed by Dump3R H3id3gg3R on 9:09 AM Rating: 5
Datasploit: A Tool To Perform Various Open Source Intelligence Techniques Datasploit: A Tool To Perform Various Open Source Intelligence Techniques Reviewed by Dump3R H3id3gg3R on 6:25 AM Rating: 5
Halcyon - IDE for Nmap Script (NSE) Development Halcyon - IDE for Nmap Script (NSE) Development Reviewed by Dump3R H3id3gg3R on 6:08 AM Rating: 5
KasperskyOS — Secure Operating System released for IoT and Embedded Systems KasperskyOS — Secure Operating System released for IoT and Embedded Systems Reviewed by Dump3R H3id3gg3R on 4:00 AM Rating: 5