Samhain - Host Based Intrusion Detection System Samhain - Host Based Intrusion Detection System Reviewed by Dump3R H3id3gg3R on 9:12 PM Rating: 5
WikiLeaks Reveals 'Marble' Source Code that CIA Used to Frame Russia and China WikiLeaks Reveals 'Marble' Source Code that CIA Used to Frame Russia and China Reviewed by Dump3R H3id3gg3R on 12:09 PM Rating: 5
Why I Always Tug on the ATM Why I Always Tug on the ATM Reviewed by Dump3R H3id3gg3R on 9:43 AM Rating: 5
Exploit Database - The official Exploit Database Repository Exploit Database - The official Exploit Database Repository Reviewed by Dump3R H3id3gg3R on 7:46 AM Rating: 5
Telegram Messenger Adds AI-powered Encrypted Voice Calls Telegram Messenger Adds AI-powered Encrypted Voice Calls Reviewed by Dump3R H3id3gg3R on 4:24 AM Rating: 5
HoneyDrive - A Honeypot Linux Distribution HoneyDrive - A Honeypot Linux Distribution Reviewed by Dump3R H3id3gg3R on 4:09 AM Rating: 5
Samsung Galaxy S8's Facial Unlocking Feature Can Be Fooled With A Photo Samsung Galaxy S8's Facial Unlocking Feature Can Be Fooled With A Photo Reviewed by Dump3R H3id3gg3R on 2:35 AM Rating: 5
Abusing Belkin Home Automation Devices Abusing Belkin Home Automation Devices Reviewed by Dump3R H3id3gg3R on 12:09 AM Rating: 5
Post-FCC Privacy Rules, Should You VPN? Post-FCC Privacy Rules, Should You VPN? Reviewed by Dump3R H3id3gg3R on 2:45 PM Rating: 5
Google Fixes Five Critical Vulnerabilities In Chrome Browser Google Fixes Five Critical Vulnerabilities In Chrome Browser Reviewed by Dump3R H3id3gg3R on 12:59 PM Rating: 5
Verizon to pre-install a 'Spyware' app on its Android phones to collect user data Verizon to pre-install a 'Spyware' app on its Android phones to collect user data Reviewed by Dump3R H3id3gg3R on 11:34 AM Rating: 5
AnonTwi - Tool To Have More Privacy On Social Media AnonTwi - Tool To Have More Privacy On Social Media Reviewed by Dump3R H3id3gg3R on 9:19 AM Rating: 5
Bypass Windows Login Password using Android Phone with DriveDroid Bypass Windows Login Password using Android Phone with DriveDroid Reviewed by Dump3R H3id3gg3R on 8:54 AM Rating: 5
Radio Hack Box - Tool to Demonstrate Vulnerabilities in Wireless Input Devices Radio Hack Box - Tool to Demonstrate Vulnerabilities in Wireless Input Devices Reviewed by Dump3R H3id3gg3R on 7:48 AM Rating: 5
Lynis 2.4.7 - Security Auditing Tool for Unix/Linux Systems Lynis 2.4.7 - Security Auditing Tool for Unix/Linux Systems Reviewed by Dump3R H3id3gg3R on 7:22 AM Rating: 5
Widespread Email Scam Targets Github Developers with Dimnie Trojan Widespread Email Scam Targets Github Developers with Dimnie Trojan Reviewed by Dump3R H3id3gg3R on 2:16 AM Rating: 5
Capture VNC Session of Remote PC using SetToolkit Capture VNC Session of Remote PC using SetToolkit Reviewed by Dump3R H3id3gg3R on 10:44 AM Rating: 5
DblTekGoIPPwn - Tool to check if an IP of a DblTek GoIP is vulnerable to a challenge-response login system, execute remote commands botnet style, and generate responses to challenges DblTekGoIPPwn - Tool to check if an IP of a DblTek GoIP is vulnerable to a challenge-response login system, execute remote commands botnet style, and generate responses to challenges Reviewed by Dump3R H3id3gg3R on 7:50 AM Rating: 5
SQLSentinel - A Cross-Platform SQLi Vulnerability Scanner SQLSentinel - A Cross-Platform SQLi Vulnerability Scanner Reviewed by Dump3R H3id3gg3R on 7:15 AM Rating: 5
How to Make People Click on a Dangerous Links Despite their Security Awareness How to Make People Click on a Dangerous Links Despite their Security Awareness Reviewed by Dump3R H3id3gg3R on 7:09 AM Rating: 5
Police Arrest Man Potentially Linked to Group Threatening to Wipe Millions Of iPhones Police Arrest Man Potentially Linked to Group Threatening to Wipe Millions Of iPhones Reviewed by Dump3R H3id3gg3R on 5:44 AM Rating: 5
Hacker Who Used Linux Botnet to Send Millions of Spam Emails Pleads Guilty Hacker Who Used Linux Botnet to Send Millions of Spam Emails Pleads Guilty Reviewed by Dump3R H3id3gg3R on 3:49 AM Rating: 5
NATO To Spend Three Billion Euro On Satellites And Cyber Security NATO To Spend Three Billion Euro On Satellites And Cyber Security Reviewed by Dump3R H3id3gg3R on 11:43 AM Rating: 5
DNSControl: A Tool for Synchronizing DNS to Multiple Providers DNSControl: A Tool for Synchronizing DNS to Multiple Providers Reviewed by Dump3R H3id3gg3R on 9:28 AM Rating: 5
wuzz - Interactive CLI Tool for HTTP Inspection wuzz - Interactive CLI Tool for HTTP Inspection Reviewed by Dump3R H3id3gg3R on 6:55 AM Rating: 5
Are You Infected with Safari Ransomware? Don't Pay — Just Install iOS 10.3 Update Are You Infected with Safari Ransomware? Don't Pay — Just Install iOS 10.3 Update Reviewed by Dump3R H3id3gg3R on 5:18 AM Rating: 5
Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates Symantec API Flaws reportedly let attackers steal Private SSL Keys and Certificates Reviewed by Dump3R H3id3gg3R on 1:44 AM Rating: 5
UK Demands Encryption Backdoor As London Terrorist Used WhatsApp Before the Attack UK Demands Encryption Backdoor As London Terrorist Used WhatsApp Before the Attack Reviewed by Dump3R H3id3gg3R on 9:48 AM Rating: 5
inquisitor - OSINT Gathering Tool for Companies and Organizations inquisitor - OSINT Gathering Tool for Companies and Organizations Reviewed by Dump3R H3id3gg3R on 7:52 AM Rating: 5
Wifislax - A Slackware-Based Penetration Testing Distribution Wifislax - A Slackware-Based Penetration Testing Distribution Reviewed by Dump3R H3id3gg3R on 7:26 AM Rating: 5
Alleged vDOS Owners Poised to Stand Trial Alleged vDOS Owners Poised to Stand Trial Reviewed by Dump3R H3id3gg3R on 7:11 AM Rating: 5
Use Secure VPNs (Lifetime Subscription) to Prevent ISPs From Spying On You Use Secure VPNs (Lifetime Subscription) to Prevent ISPs From Spying On You Reviewed by Dump3R H3id3gg3R on 6:55 AM Rating: 5
Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking Reviewed by Dump3R H3id3gg3R on 6:00 AM Rating: 5
DNSwalk - A DNS Database Debugger DNSwalk - A DNS Database Debugger Reviewed by Dump3R H3id3gg3R on 1:11 AM Rating: 5
How to Delete Firewall Log in Remote PC using Metasploit How to Delete Firewall Log in Remote PC using Metasploit Reviewed by Dump3R H3id3gg3R on 10:55 AM Rating: 5
How to Enable and Monitor Firewall Log in Windows PC How to Enable and Monitor Firewall Log in Windows PC Reviewed by Dump3R H3id3gg3R on 10:00 AM Rating: 5
Scythe Framework - An Account Enumeration Tool Scythe Framework - An Account Enumeration Tool Reviewed by Dump3R H3id3gg3R on 8:30 AM Rating: 5