DotDotPwn - Directory Traversal Fuzzer DotDotPwn - Directory Traversal Fuzzer Reviewed by Unknown on 10:32 PM Rating: 5
Exploit Remote Windows PC with Eternalblue & Doublepulsar Exploit in Metasploit Exploit Remote Windows PC with Eternalblue & Doublepulsar Exploit in Metasploit Reviewed by Unknown on 10:21 AM Rating: 5
Hack the billu: b0x VM (Boot2root Challenge) Hack the billu: b0x VM (Boot2root Challenge) Reviewed by Unknown on 9:25 AM Rating: 5
PowerStager - A payload stager using PowerShell PowerStager - A payload stager using PowerShell Reviewed by Unknown on 7:34 AM Rating: 5
Wikipedia Blocked In Turkey For Not Removing Content Wikipedia Blocked In Turkey For Not Removing Content Reviewed by Unknown on 2:50 PM Rating: 5
Operative Framework v1.0b - Fingerprint Framework Operative Framework v1.0b - Fingerprint Framework Reviewed by Unknown on 7:53 AM Rating: 5
Embedded Backdoor with Image using FakeImageExploiter Embedded Backdoor with Image using FakeImageExploiter Reviewed by Unknown on 7:27 AM Rating: 5
2 ways to use Msfvenom Payload with Netcat 2 ways to use Msfvenom Payload with Netcat Reviewed by Unknown on 6:48 AM Rating: 5
Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking Insecure Apps that Open Ports Leave Millions of Smartphones at Risk of Hacking Reviewed by Unknown on 4:33 AM Rating: 5
CIA's Secret Tool to Track Whistleblowers and Spies Leaked by Wikileaks CIA's Secret Tool to Track Whistleblowers and Spies Leaked by Wikileaks Reviewed by Unknown on 11:20 AM Rating: 5
Leviathan - Wide Range Mass Audit Toolkit Leviathan - Wide Range Mass Audit Toolkit Reviewed by Unknown on 7:23 AM Rating: 5
Computer Security Handbook, 6th Edition ($130 Value) FREE For a Limited Time Computer Security Handbook, 6th Edition ($130 Value) FREE For a Limited Time Reviewed by Unknown on 5:36 AM Rating: 5
Hackode - Android App For Hackers Hackode - Android App For Hackers Reviewed by Unknown on 5:12 AM Rating: 5
How to Choose A PCB Design Software in 2017 How to Choose A PCB Design Software in 2017 Reviewed by Unknown on 4:47 AM Rating: 5
New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic Reviewed by Unknown on 2:15 AM Rating: 5
Best Flash Drive Data Recovery Software For You Best Flash Drive Data Recovery Software For You Reviewed by Unknown on 12:50 AM Rating: 5
Blind Trust in Email Could Cost You Your Home Blind Trust in Email Could Cost You Your Home Reviewed by Unknown on 1:40 PM Rating: 5
Save the Internet: FCC Unveils Plan to Rollback Net-Neutrality Rules Save the Internet: FCC Unveils Plan to Rollback Net-Neutrality Rules Reviewed by Unknown on 10:42 AM Rating: 5
Inspeckage - (Android Package Inspector) Dynamic Analysis With Api Hooks, Start Unexported Activities And More Inspeckage - (Android Package Inspector) Dynamic Analysis With Api Hooks, Start Unexported Activities And More Reviewed by Unknown on 7:52 AM Rating: 5
Hack'em If You Can — U.S. Air Force launches Bug Bounty Program Hack'em If You Can — U.S. Air Force launches Bug Bounty Program Reviewed by Unknown on 6:57 AM Rating: 5
Hajime ‘Vigilante Botnet’ Growing Rapidly; Hijacks 300,000 IoT Devices Worldwide Hajime ‘Vigilante Botnet’ Growing Rapidly; Hijacks 300,000 IoT Devices Worldwide Reviewed by Unknown on 1:57 AM Rating: 5
Manticore A Dynamic Binary Analysis Tool Manticore A Dynamic Binary Analysis Tool Reviewed by Unknown on 10:54 AM Rating: 5
Hack the Orcus VM CTF Challenge Hack the Orcus VM CTF Challenge Reviewed by Unknown on 8:49 AM Rating: 5
InfectPE - Inject Custom Code into PE File InfectPE - Inject Custom Code into PE File Reviewed by Unknown on 7:30 AM Rating: 5
Beware! New Android Malware Infected 2 Million Google Play Store Users Beware! New Android Malware Infected 2 Million Google Play Store Users Reviewed by Unknown on 2:45 AM Rating: 5
Kali Linux 2017.1 Release Kali Linux 2017.1 Release Reviewed by Unknown on 4:04 PM Rating: 5
Xortool - A Tool To Analyze Multi-byte XOR Cipher Xortool - A Tool To Analyze Multi-byte XOR Cipher Reviewed by Unknown on 12:43 PM Rating: 5
Server Side Injection Exploitation in bWapp Server Side Injection Exploitation in bWapp Reviewed by Unknown on 11:56 AM Rating: 5
UK Man Gets Two Years in Jail for Running ‘Titanium Stresser’ Attack-for-Hire Service UK Man Gets Two Years in Jail for Running ‘Titanium Stresser’ Attack-for-Hire Service Reviewed by Unknown on 8:21 AM Rating: 5
WPSeku - Simple Wordpress Security Scanner WPSeku - Simple Wordpress Security Scanner Reviewed by Unknown on 7:32 AM Rating: 5
Webroot 'mistakenly' flags Windows as Malware and Facebook as Phishing site Webroot 'mistakenly' flags Windows as Malware and Facebook as Phishing site Reviewed by Unknown on 3:44 AM Rating: 5
Atlassian's HipChat hacked, user data and private messages compromised Atlassian's HipChat hacked, user data and private messages compromised Reviewed by Unknown on 2:50 AM Rating: 5
Breaking Instagram is Down For Everyone Breaking Instagram is Down For Everyone Reviewed by Unknown on 11:07 AM Rating: 5
The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence Reviewed by Unknown on 9:40 AM Rating: 5
Learn Practical Hacking Online — Get Training For Just $45! Learn Practical Hacking Online — Get Training For Just $45! Reviewed by Unknown on 8:14 AM Rating: 5
PowerMeta - PowerShell Script to Search Publicly Files for a Particular Domain and Get the Associated MetaData PowerMeta - PowerShell Script to Search Publicly Files for a Particular Domain and Get the Associated MetaData Reviewed by Unknown on 7:33 AM Rating: 5
SySS Radio Hack Box to Hack Wireless SySS Radio Hack Box to Hack Wireless Reviewed by Unknown on 3:47 AM Rating: 5
Blindy - Simple Script for running BruteForce Blind MySql Injection Blindy - Simple Script for running BruteForce Blind MySql Injection Reviewed by Unknown on 8:11 AM Rating: 5
ARPwner - ARP & DNS Poisoning Attack Tool ARPwner - ARP & DNS Poisoning Attack Tool Reviewed by Unknown on 6:24 AM Rating: 5
14 Best Songs (Poems) About Hacking 14 Best Songs (Poems) About Hacking Reviewed by Unknown on 2:28 PM Rating: 5
Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs Reviewed by Unknown on 8:12 AM Rating: 5
DBShield - Database Firewall Written In Go DBShield - Database Firewall Written In Go Reviewed by Unknown on 7:57 AM Rating: 5
US Court Sentences Russian Lawmaker's Son to 27 Years in Jail for Hacking US Court Sentences Russian Lawmaker's Son to 27 Years in Jail for Hacking Reviewed by Unknown on 3:32 AM Rating: 5
ADHD - An Ubuntu Based Security Distribution ADHD - An Ubuntu Based Security Distribution Reviewed by Unknown on 12:44 AM Rating: 5
Truehunter - Tool to detect TrueCrypt containers Truehunter - Tool  to detect TrueCrypt containers Reviewed by Unknown on 3:10 PM Rating: 5
How Cybercrooks Put the Beatdown on My Beats How Cybercrooks Put the Beatdown on My Beats Reviewed by Unknown on 12:41 PM Rating: 5
PyT- Python Taint: Static Analysis of Python Web Applications Security Software PyT- Python Taint: Static Analysis of Python Web Applications Security Software Reviewed by Unknown on 10:41 AM Rating: 5
MultiScanner - Modular File Scanning/Analysis Framework MultiScanner - Modular File Scanning/Analysis Framework Reviewed by Unknown on 7:44 AM Rating: 5