Santoku - A Linux Distro For Mobile Security, Malware Analysis, and Forensics Santoku -  A Linux Distro For Mobile Security, Malware Analysis, and Forensics Reviewed by Unknown on 9:06 PM Rating: 5
So You Think You Can Spot a Skimmer? So You Think You Can Spot a Skimmer? Reviewed by Unknown on 1:39 PM Rating: 5
Wikileaks Reveals CIA Malware that Hacks Linux Computers Wikileaks Reveals CIA Malware that Hacks Linux Computers Reviewed by Unknown on 1:12 PM Rating: 5
LARE - [L]ocal [A]uto [R]oot [E]xploiter is a Bash Script That Helps You Deploy Local Root Exploits LARE - [L]ocal [A]uto [R]oot [E]xploiter is a Bash Script That Helps You Deploy Local Root Exploits Reviewed by Unknown on 9:42 AM Rating: 5
Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox Reviewed by Unknown on 9:04 AM Rating: 5
Windows 10 to Get Built-in Protection Against Most Ransomware Attacks Windows 10 to Get Built-in Protection Against Most Ransomware Attacks Reviewed by Unknown on 2:45 AM Rating: 5
Sanewall - A Firewall Builder For Linux Sanewall - A Firewall Builder For Linux Reviewed by Unknown on 1:44 AM Rating: 5
Arachni - Web Application Security Scanner Framework Arachni - Web Application Security Scanner Framework Reviewed by Unknown on 2:40 PM Rating: 5
Gitrob - Reconnaissance Tool for GitHub Organizations Gitrob - Reconnaissance Tool for GitHub Organizations Reviewed by Unknown on 8:42 AM Rating: 5
Original Author of Petya Ransomware is Back & He Wants to Help NotPetya Victims Original Author of Petya Ransomware is Back & He Wants to Help NotPetya Victims Reviewed by Unknown on 7:28 AM Rating: 5
Resolver - A Reverse DNS Lookup Tool Resolver - A Reverse DNS Lookup Tool Reviewed by Unknown on 4:57 AM Rating: 5
Telegram Agrees to Register With Russia to Avoid Ban, But Won't Share User Data Telegram Agrees to Register With Russia to Avoid Ban, But Won't Share User Data Reviewed by Unknown on 2:02 AM Rating: 5
Beginner Guide to File Inclusion Attack (LFI/RFI) Beginner Guide to File Inclusion Attack (LFI/RFI) Reviewed by Unknown on 1:13 AM Rating: 5
Nessus - An Advanced Vulnerability Scanner Nessus - An Advanced Vulnerability Scanner Reviewed by Unknown on 12:45 AM Rating: 5
Database Penetration Testing using Sqlmap (Part 1) Database Penetration Testing using Sqlmap (Part 1) Reviewed by Unknown on 12:40 AM Rating: 5
Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response Reviewed by Unknown on 12:21 AM Rating: 5
angryFuzzer - Tool for Information Gathering angryFuzzer - Tool for Information Gathering Reviewed by Unknown on 4:57 PM Rating: 5
Turns Out New Petya is Not a Ransomware, It’s a Destructive Wiper Malware Turns Out New Petya is Not a Ransomware, It’s a Destructive Wiper Malware Reviewed by Unknown on 12:22 PM Rating: 5
Microsoft Adding Artificial-Intelligence Based Advanced Antivirus to Windows 10 Microsoft Adding Artificial-Intelligence Based Advanced Antivirus to Windows 10 Reviewed by Unknown on 9:28 AM Rating: 5
morphHTA - Morphing Cobalt Strike PowerShell Evil HTA Generator morphHTA - Morphing Cobalt Strike PowerShell Evil HTA Generator Reviewed by Unknown on 8:26 AM Rating: 5
Here's How CIA Malware Tracks Geo-Location of its Targets Here's How CIA Malware Tracks Geo-Location of its Targets Reviewed by Unknown on 6:12 AM Rating: 5
Vega - Web Application Security Scanner Vega - Web Application Security Scanner Reviewed by Unknown on 4:52 AM Rating: 5
How to Spider Web Applications using Burpsuite How to Spider Web Applications using Burpsuite Reviewed by Unknown on 1:52 AM Rating: 5
'Shadow Brokers' Threatens to Unmask A Hacker Who Worked With NSA 'Shadow Brokers' Threatens to Unmask A Hacker Who Worked With NSA Reviewed by Unknown on 1:13 AM Rating: 5
Critical Skype Bug Lets Hackers Remotely Execute Malicious Code Critical Skype Bug Lets Hackers Remotely Execute Malicious Code Reviewed by Unknown on 12:20 AM Rating: 5
‘Petya’ Ransomware Outbreak Goes Global ‘Petya’ Ransomware Outbreak Goes Global Reviewed by Unknown on 1:30 PM Rating: 5
XSStrike - Fuzz and Bruteforce Parameters for XSS XSStrike - Fuzz and Bruteforce Parameters for XSS Reviewed by Unknown on 8:52 AM Rating: 5
Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry Reviewed by Unknown on 7:43 AM Rating: 5
Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results Reviewed by Unknown on 4:21 AM Rating: 5
sylkie: IPv6 Address Spoofing sylkie: IPv6 Address Spoofing Reviewed by Unknown on 10:54 AM Rating: 5
Russia Threatens to Ban Telegram Messaging App, Says It Was Used By Terrorists Russia Threatens to Ban Telegram Messaging App, Says It Was Used By Terrorists Reviewed by Unknown on 10:12 AM Rating: 5
Dumping Database using Outfile Dumping Database using Outfile Reviewed by Unknown on 9:10 AM Rating: 5
getsploit - Command line utility for searching and downloading exploits getsploit - Command line utility for searching and downloading exploits Reviewed by Unknown on 8:29 AM Rating: 5
UK Parliament Hit by Cyberattack, Up to 90 MPs' E-mail Accounts Hacked UK Parliament Hit by Cyberattack, Up to 90 MPs' E-mail Accounts Hacked Reviewed by Unknown on 4:24 AM Rating: 5
Brakeman - A Static Analysis Security Vulnerability Scanner For Ruby on Rails Applications Brakeman - A Static Analysis Security Vulnerability Scanner For Ruby on Rails Applications Reviewed by Unknown on 3:10 AM Rating: 5
Got Robocalled? Don’t Get Mad; Get Busy. Got Robocalled? Don’t Get Mad; Get Busy. Reviewed by Unknown on 8:38 AM Rating: 5
CAVE MINER - Search for Code Cave in All Binaries (ELF, PE and Mach-o) and Inject Payload CAVE MINER - Search for Code Cave in All Binaries (ELF, PE and Mach-o) and Inject Payload Reviewed by Unknown on 7:48 AM Rating: 5
Enhanced Mitigation Experience Toolkit (EMET) - An Anti-Exploitation Tool Enhanced Mitigation Experience Toolkit (EMET) - An Anti-Exploitation Tool Reviewed by Unknown on 2:54 AM Rating: 5
Influencing Your Target without a Word: Jedi Mind Tricks Influencing Your Target without a Word: Jedi Mind Tricks Reviewed by Unknown on 11:33 AM Rating: 5
Viproy - VoIP Penetration Testing and Exploitation Kit Viproy - VoIP Penetration Testing and Exploitation Kit Reviewed by Unknown on 7:50 AM Rating: 5
CSRF Exploitation using XSS CSRF Exploitation using XSS Reviewed by Unknown on 4:23 AM Rating: 5
32TB of Windows 10 Internal Builds & Source Code Leaked Online 32TB of Windows 10 Internal Builds & Source Code Leaked Online Reviewed by Unknown on 10:23 PM Rating: 5
ShellStack - A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently ShellStack - A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently Reviewed by Unknown on 1:13 PM Rating: 5
spoilerwall - Avoid being scanned by spoiling movies on all your ports! spoilerwall - Avoid being scanned by spoiling movies on all your ports! Reviewed by Unknown on 8:30 AM Rating: 5
FBI: Extortion, CEO Fraud Among Top Online Fraud Complaints in 2016 FBI: Extortion, CEO Fraud Among Top Online Fraud Complaints in 2016 Reviewed by Unknown on 7:30 AM Rating: 5
Two British Men Arrested For Hacking Microsoft Two British Men Arrested For Hacking Microsoft Reviewed by Unknown on 3:25 AM Rating: 5
New GhostHook Attack Bypasses Windows 10 PatchGuard Protections New GhostHook Attack Bypasses Windows 10 PatchGuard Protections Reviewed by Unknown on 11:02 PM Rating: 5
sharkPy - NSA Tool to Dissect, Analyze, and Interact with Network Packet Data using Wireshark and libpcap capabilities sharkPy - NSA Tool to Dissect, Analyze, and Interact with Network Packet Data using Wireshark and libpcap capabilities Reviewed by Unknown on 8:41 AM Rating: 5
No, WannaCry Is Not Dead! Hits Honda & Traffic Light Camera System No, WannaCry Is Not Dead! Hits Honda & Traffic Light Camera System Reviewed by Unknown on 7:54 AM Rating: 5
Why So Many Top Hackers Hail from Russia Why So Many Top Hackers Hail from Russia Reviewed by Unknown on 7:35 AM Rating: 5
Understanding Encoding (Beginner’s guide) Understanding Encoding (Beginner’s guide) Reviewed by Unknown on 4:49 AM Rating: 5