Credit Card Breach at Kmart Stores. Again. Credit Card Breach at Kmart Stores. Again. Reviewed by Dump3R H3id3gg3R on 7:36 PM Rating: 5
US Defense Contractor left Sensitive Files on Amazon Server Without Password US Defense Contractor left Sensitive Files on Amazon Server Without Password Reviewed by Dump3R H3id3gg3R on 11:28 AM Rating: 5
HTTrack Website Copier - A Free Website Mirroring Tool HTTrack Website Copier - A Free Website Mirroring Tool Reviewed by Dump3R H3id3gg3R on 11:12 AM Rating: 5
WPSeku v0.2 - Wordpress Security Scanner WPSeku v0.2 - Wordpress Security Scanner Reviewed by Dump3R H3id3gg3R on 8:29 AM Rating: 5
LinkedIn Hacker, Wanted by US & Russian, Can be Extradited to Either State LinkedIn Hacker, Wanted by US & Russian, Can be Extradited to Either State Reviewed by Dump3R H3id3gg3R on 2:16 AM Rating: 5
US Federal District Court Sentenced Three Nigerian Scammers A Collective 265 Years in Prison US Federal District Court Sentenced Three Nigerian Scammers A Collective 265 Years in Prison Reviewed by Dump3R H3id3gg3R on 11:07 AM Rating: 5
Faraday v2.5 - Collaborative Penetration Test and Vulnerability Management Platform Faraday v2.5 - Collaborative Penetration Test and Vulnerability Management Platform Reviewed by Dump3R H3id3gg3R on 8:38 AM Rating: 5
Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication Reviewed by Dump3R H3id3gg3R on 5:58 AM Rating: 5
Shadow Brokers Launches 0-Day Exploit Subscriptions for $21,000 Per Month Shadow Brokers Launches 0-Day Exploit Subscriptions for $21,000 Per Month Reviewed by Dump3R H3id3gg3R on 12:33 AM Rating: 5
Linguistic Analysis Suggests WannaCry Hackers Could be From Southern China Linguistic Analysis Suggests WannaCry Hackers Could be From Southern China Reviewed by Dump3R H3id3gg3R on 11:25 AM Rating: 5
Manual SQL Injection Exploitation Step by Step Manual SQL Injection Exploitation Step by Step Reviewed by Dump3R H3id3gg3R on 10:38 AM Rating: 5
explo - Human And Machine Readable Web Vulnerability Testing Format explo - Human And Machine Readable Web Vulnerability Testing Format Reviewed by Dump3R H3id3gg3R on 8:20 AM Rating: 5
Judy Android Malware Infects Over 36.5 Million Google Play Store Users Judy Android Malware Infects Over 36.5 Million Google Play Store Users Reviewed by Dump3R H3id3gg3R on 7:17 AM Rating: 5
Bluelog - A Highly Configurable Linux Bluetooth Scanner Bluelog - A Highly Configurable Linux Bluetooth Scanner Reviewed by Dump3R H3id3gg3R on 6:29 AM Rating: 5
Russian Hackers Made 'Tainted Leaks' a Thing — Phishing to Propaganda Russian Hackers Made 'Tainted Leaks' a Thing — Phishing to Propaganda Reviewed by Dump3R H3id3gg3R on 12:48 AM Rating: 5
Applied Machine Learning for Data exfil and other fun topics Applied Machine Learning for Data exfil and other fun topics Reviewed by Dump3R H3id3gg3R on 10:54 AM Rating: 5
Beginner Guide of SQL Injection (Part 1) Beginner Guide of SQL Injection (Part 1) Reviewed by Dump3R H3id3gg3R on 9:59 AM Rating: 5
massExpConsole - Collection of Tools and Exploits with a CLI UI massExpConsole - Collection of Tools and Exploits with a CLI UI Reviewed by Dump3R H3id3gg3R on 9:14 AM Rating: 5
Hack Legal Notice Caption of Remote PC Hack Legal Notice Caption of Remote PC Reviewed by Dump3R H3id3gg3R on 10:10 AM Rating: 5
QuickSand.io - Tool For Scanning Streams Within Office Documents Plus Xor DB Attack QuickSand.io - Tool For Scanning Streams Within Office Documents Plus Xor DB Attack Reviewed by Dump3R H3id3gg3R on 8:40 AM Rating: 5
Matriux - A Debian Based Penetration Testing Distribution Matriux - A Debian Based Penetration Testing Distribution Reviewed by Dump3R H3id3gg3R on 7:02 AM Rating: 5
Was North Korea Behind the Wannacry Ransomware? Was North Korea Behind the Wannacry Ransomware? Reviewed by Dump3R H3id3gg3R on 12:37 AM Rating: 5
How to set up SQLI Lab in in Kali How to set up SQLI Lab in in Kali Reviewed by Dump3R H3id3gg3R on 8:26 AM Rating: 5
NSEarch - Nmap Scripting Engine Search NSEarch - Nmap Scripting Engine Search Reviewed by Dump3R H3id3gg3R on 8:20 AM Rating: 5
Chrome Autofill Viewer - Tool For Viewing, Recovering, and Deleting Autocomplete Data From Google Chrome Chrome Autofill Viewer - Tool For Viewing, Recovering, and Deleting Autocomplete Data From Google Chrome Reviewed by Dump3R H3id3gg3R on 7:14 AM Rating: 5
3 Nigerian Scammers Get 235-Years of Total Jail Sentence in U.S. 3 Nigerian Scammers Get 235-Years of Total Jail Sentence in U.S. Reviewed by Dump3R H3id3gg3R on 2:03 AM Rating: 5
Trump’s Dumps: ‘Making Dumps Great Again’ Trump’s Dumps: ‘Making Dumps Great Again’ Reviewed by Dump3R H3id3gg3R on 9:58 PM Rating: 5
Capsa - Tool For Analyzing Network Traffic Capsa - Tool For Analyzing Network Traffic Reviewed by Dump3R H3id3gg3R on 1:19 PM Rating: 5
MolinaHealthcare.com Exposed Patient Records MolinaHealthcare.com Exposed Patient Records Reviewed by Dump3R H3id3gg3R on 11:22 AM Rating: 5
All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack Reviewed by Dump3R H3id3gg3R on 9:56 AM Rating: 5
PhishingKitHunter - Find Phishing Kits Which Use Your Brand/Organization'S Files And Image PhishingKitHunter - Find Phishing Kits Which Use Your Brand/Organization'S Files And Image Reviewed by Dump3R H3id3gg3R on 8:49 AM Rating: 5
Wanna Cry Again? NSA’s Windows 'EsteemAudit' RDP Exploit Remains Unpatched Wanna Cry Again? NSA’s Windows 'EsteemAudit' RDP Exploit Remains Unpatched Reviewed by Dump3R H3id3gg3R on 4:12 AM Rating: 5
7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely 7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely Reviewed by Dump3R H3id3gg3R on 12:28 AM Rating: 5
Dagon - Advanced Hash Manipulation Dagon - Advanced Hash Manipulation Reviewed by Dump3R H3id3gg3R on 8:34 AM Rating: 5
Secure VPN Services With Lifetime Subscription (Save up to 95%) - Limited Time Deal Secure VPN Services With Lifetime Subscription (Save up to 95%) - Limited Time Deal Reviewed by Dump3R H3id3gg3R on 5:58 AM Rating: 5
Microsoft Unveils Special Version of Windows 10 For Chinese Government Microsoft Unveils Special Version of Windows 10 For Chinese Government Reviewed by Dump3R H3id3gg3R on 2:57 AM Rating: 5
It's Insanely Easy to Bypass Samsung Galaxy S8 Iris Scanner with a Photo It's Insanely Easy to Bypass Samsung Galaxy S8 Iris Scanner with a Photo Reviewed by Dump3R H3id3gg3R on 12:48 AM Rating: 5
Beware! Subtitle Files Can Hack Your Computer While You're Enjoying Movies Beware! Subtitle Files Can Hack Your Computer While You're Enjoying Movies Reviewed by Dump3R H3id3gg3R on 10:25 AM Rating: 5
Hacking Group Arrested For Infecting Over 1 Million Phones With Banking Trojan Hacking Group Arrested For Infecting Over 1 Million Phones With Banking Trojan Reviewed by Dump3R H3id3gg3R on 8:35 AM Rating: 5
Cangibrina - A Fast And Powerfull Dashboard (Admin) Finder Cangibrina - A Fast And Powerfull Dashboard (Admin) Finder Reviewed by Dump3R H3id3gg3R on 8:29 AM Rating: 5
PunkSPIDER - Web Application Vulnerability Search Engine PunkSPIDER - Web Application Vulnerability Search Engine Reviewed by Dump3R H3id3gg3R on 8:03 AM Rating: 5
DEF CON: Human Hacking: You are the Weak Link DEF CON: Human Hacking: You are the Weak Link Reviewed by Dump3R H3id3gg3R on 6:06 AM Rating: 5
Exploit Windows PC using EternalBlue SMB Remote Windows Kernel Pool Corruption Exploit Windows PC using EternalBlue SMB Remote Windows Kernel Pool Corruption Reviewed by Dump3R H3id3gg3R on 5:10 AM Rating: 5
18-Byte ImageMagick Hack Could Have Leaked Images From Yahoo Mail Server 18-Byte ImageMagick Hack Could Have Leaked Images From Yahoo Mail Server Reviewed by Dump3R H3id3gg3R on 1:20 AM Rating: 5
Should SaaS Companies Publish Customers Lists? Should SaaS Companies Publish Customers Lists? Reviewed by Dump3R H3id3gg3R on 1:57 PM Rating: 5
Private Eye Allegedly Used Leaky Goverment Tool in Bid to Find Tax Data on Trump Private Eye Allegedly Used Leaky Goverment Tool in Bid to Find Tax Data on Trump Reviewed by Dump3R H3id3gg3R on 1:29 PM Rating: 5
Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2 Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2 Reviewed by Dump3R H3id3gg3R on 9:01 AM Rating: 5
Cameradar - An RTSP Surveillance Camera Access Multitool Cameradar - An RTSP Surveillance Camera Access Multitool Reviewed by Dump3R H3id3gg3R on 8:25 AM Rating: 5
Hashcat - An Advanced Password Cracking Tool Hashcat - An Advanced Password Cracking Tool Reviewed by Dump3R H3id3gg3R on 6:00 AM Rating: 5
Netgear Now Collects Router 'Analytics Data' — Here’s How to Disable It Netgear Now Collects Router 'Analytics Data' — Here’s How to Disable It Reviewed by Dump3R H3id3gg3R on 1:34 AM Rating: 5
JailBreak DIY- Fried Apple JailBreak DIY- Fried Apple Reviewed by Dump3R H3id3gg3R on 11:12 AM Rating: 5
Netcat Tutorials for Beginner Netcat Tutorials for Beginner Reviewed by Dump3R H3id3gg3R on 10:16 AM Rating: 5