Santoku - A Linux Distro For Mobile Security, Malware Analysis, and Forensics Santoku -  A Linux Distro For Mobile Security, Malware Analysis, and Forensics Reviewed by Dump3R H3id3gg3R on 9:06 PM Rating: 5
So You Think You Can Spot a Skimmer? So You Think You Can Spot a Skimmer? Reviewed by Dump3R H3id3gg3R on 1:39 PM Rating: 5
Wikileaks Reveals CIA Malware that Hacks Linux Computers Wikileaks Reveals CIA Malware that Hacks Linux Computers Reviewed by Dump3R H3id3gg3R on 1:12 PM Rating: 5
LARE - [L]ocal [A]uto [R]oot [E]xploiter is a Bash Script That Helps You Deploy Local Root Exploits LARE - [L]ocal [A]uto [R]oot [E]xploiter is a Bash Script That Helps You Deploy Local Root Exploits Reviewed by Dump3R H3id3gg3R on 9:42 AM Rating: 5
Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox Reviewed by Dump3R H3id3gg3R on 9:04 AM Rating: 5
Windows 10 to Get Built-in Protection Against Most Ransomware Attacks Windows 10 to Get Built-in Protection Against Most Ransomware Attacks Reviewed by Dump3R H3id3gg3R on 2:45 AM Rating: 5
Sanewall - A Firewall Builder For Linux Sanewall - A Firewall Builder For Linux Reviewed by Dump3R H3id3gg3R on 1:44 AM Rating: 5
Arachni - Web Application Security Scanner Framework Arachni - Web Application Security Scanner Framework Reviewed by Dump3R H3id3gg3R on 2:40 PM Rating: 5
Gitrob - Reconnaissance Tool for GitHub Organizations Gitrob - Reconnaissance Tool for GitHub Organizations Reviewed by Dump3R H3id3gg3R on 8:42 AM Rating: 5
Original Author of Petya Ransomware is Back & He Wants to Help NotPetya Victims Original Author of Petya Ransomware is Back & He Wants to Help NotPetya Victims Reviewed by Dump3R H3id3gg3R on 7:28 AM Rating: 5
Resolver - A Reverse DNS Lookup Tool Resolver - A Reverse DNS Lookup Tool Reviewed by Dump3R H3id3gg3R on 4:57 AM Rating: 5
Telegram Agrees to Register With Russia to Avoid Ban, But Won't Share User Data Telegram Agrees to Register With Russia to Avoid Ban, But Won't Share User Data Reviewed by Dump3R H3id3gg3R on 2:02 AM Rating: 5
Beginner Guide to File Inclusion Attack (LFI/RFI) Beginner Guide to File Inclusion Attack (LFI/RFI) Reviewed by Dump3R H3id3gg3R on 1:13 AM Rating: 5
Nessus - An Advanced Vulnerability Scanner Nessus - An Advanced Vulnerability Scanner Reviewed by Dump3R H3id3gg3R on 12:45 AM Rating: 5
Database Penetration Testing using Sqlmap (Part 1) Database Penetration Testing using Sqlmap (Part 1) Reviewed by Dump3R H3id3gg3R on 12:40 AM Rating: 5
Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response Your Linux Machine Can Be Hacked Remotely With Just A Malicious DNS Response Reviewed by Dump3R H3id3gg3R on 12:21 AM Rating: 5
angryFuzzer - Tool for Information Gathering angryFuzzer - Tool for Information Gathering Reviewed by Dump3R H3id3gg3R on 4:57 PM Rating: 5
Turns Out New Petya is Not a Ransomware, It’s a Destructive Wiper Malware Turns Out New Petya is Not a Ransomware, It’s a Destructive Wiper Malware Reviewed by Dump3R H3id3gg3R on 12:22 PM Rating: 5
Microsoft Adding Artificial-Intelligence Based Advanced Antivirus to Windows 10 Microsoft Adding Artificial-Intelligence Based Advanced Antivirus to Windows 10 Reviewed by Dump3R H3id3gg3R on 9:28 AM Rating: 5
morphHTA - Morphing Cobalt Strike PowerShell Evil HTA Generator morphHTA - Morphing Cobalt Strike PowerShell Evil HTA Generator Reviewed by Dump3R H3id3gg3R on 8:26 AM Rating: 5
Here's How CIA Malware Tracks Geo-Location of its Targets Here's How CIA Malware Tracks Geo-Location of its Targets Reviewed by Dump3R H3id3gg3R on 6:12 AM Rating: 5
Vega - Web Application Security Scanner Vega - Web Application Security Scanner Reviewed by Dump3R H3id3gg3R on 4:52 AM Rating: 5
How to Spider Web Applications using Burpsuite How to Spider Web Applications using Burpsuite Reviewed by Dump3R H3id3gg3R on 1:52 AM Rating: 5
'Shadow Brokers' Threatens to Unmask A Hacker Who Worked With NSA 'Shadow Brokers' Threatens to Unmask A Hacker Who Worked With NSA Reviewed by Dump3R H3id3gg3R on 1:13 AM Rating: 5
Critical Skype Bug Lets Hackers Remotely Execute Malicious Code Critical Skype Bug Lets Hackers Remotely Execute Malicious Code Reviewed by Dump3R H3id3gg3R on 12:20 AM Rating: 5
‘Petya’ Ransomware Outbreak Goes Global ‘Petya’ Ransomware Outbreak Goes Global Reviewed by Dump3R H3id3gg3R on 1:30 PM Rating: 5
XSStrike - Fuzz and Bruteforce Parameters for XSS XSStrike - Fuzz and Bruteforce Parameters for XSS Reviewed by Dump3R H3id3gg3R on 8:52 AM Rating: 5
Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry Reviewed by Dump3R H3id3gg3R on 7:43 AM Rating: 5
Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results Google Gets Record-Breaking $2.7 Billion Fine for Manipulating Search Results Reviewed by Dump3R H3id3gg3R on 4:21 AM Rating: 5
sylkie: IPv6 Address Spoofing sylkie: IPv6 Address Spoofing Reviewed by Dump3R H3id3gg3R on 10:54 AM Rating: 5
Russia Threatens to Ban Telegram Messaging App, Says It Was Used By Terrorists Russia Threatens to Ban Telegram Messaging App, Says It Was Used By Terrorists Reviewed by Dump3R H3id3gg3R on 10:12 AM Rating: 5
Dumping Database using Outfile Dumping Database using Outfile Reviewed by Dump3R H3id3gg3R on 9:10 AM Rating: 5
getsploit - Command line utility for searching and downloading exploits getsploit - Command line utility for searching and downloading exploits Reviewed by Dump3R H3id3gg3R on 8:29 AM Rating: 5
UK Parliament Hit by Cyberattack, Up to 90 MPs' E-mail Accounts Hacked UK Parliament Hit by Cyberattack, Up to 90 MPs' E-mail Accounts Hacked Reviewed by Dump3R H3id3gg3R on 4:24 AM Rating: 5
Brakeman - A Static Analysis Security Vulnerability Scanner For Ruby on Rails Applications Brakeman - A Static Analysis Security Vulnerability Scanner For Ruby on Rails Applications Reviewed by Dump3R H3id3gg3R on 3:10 AM Rating: 5
Got Robocalled? Don’t Get Mad; Get Busy. Got Robocalled? Don’t Get Mad; Get Busy. Reviewed by Dump3R H3id3gg3R on 8:38 AM Rating: 5
CAVE MINER - Search for Code Cave in All Binaries (ELF, PE and Mach-o) and Inject Payload CAVE MINER - Search for Code Cave in All Binaries (ELF, PE and Mach-o) and Inject Payload Reviewed by Dump3R H3id3gg3R on 7:48 AM Rating: 5
Enhanced Mitigation Experience Toolkit (EMET) - An Anti-Exploitation Tool Enhanced Mitigation Experience Toolkit (EMET) - An Anti-Exploitation Tool Reviewed by Dump3R H3id3gg3R on 2:54 AM Rating: 5
Influencing Your Target without a Word: Jedi Mind Tricks Influencing Your Target without a Word: Jedi Mind Tricks Reviewed by Dump3R H3id3gg3R on 11:33 AM Rating: 5
Viproy - VoIP Penetration Testing and Exploitation Kit Viproy - VoIP Penetration Testing and Exploitation Kit Reviewed by Dump3R H3id3gg3R on 7:50 AM Rating: 5
CSRF Exploitation using XSS CSRF Exploitation using XSS Reviewed by Dump3R H3id3gg3R on 4:23 AM Rating: 5
32TB of Windows 10 Internal Builds & Source Code Leaked Online 32TB of Windows 10 Internal Builds & Source Code Leaked Online Reviewed by Dump3R H3id3gg3R on 10:23 PM Rating: 5
ShellStack - A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently ShellStack - A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently Reviewed by Dump3R H3id3gg3R on 1:13 PM Rating: 5
spoilerwall - Avoid being scanned by spoiling movies on all your ports! spoilerwall - Avoid being scanned by spoiling movies on all your ports! Reviewed by Dump3R H3id3gg3R on 8:30 AM Rating: 5
FBI: Extortion, CEO Fraud Among Top Online Fraud Complaints in 2016 FBI: Extortion, CEO Fraud Among Top Online Fraud Complaints in 2016 Reviewed by Dump3R H3id3gg3R on 7:30 AM Rating: 5
Two British Men Arrested For Hacking Microsoft Two British Men Arrested For Hacking Microsoft Reviewed by Dump3R H3id3gg3R on 3:25 AM Rating: 5
New GhostHook Attack Bypasses Windows 10 PatchGuard Protections New GhostHook Attack Bypasses Windows 10 PatchGuard Protections Reviewed by Dump3R H3id3gg3R on 11:02 PM Rating: 5
sharkPy - NSA Tool to Dissect, Analyze, and Interact with Network Packet Data using Wireshark and libpcap capabilities sharkPy - NSA Tool to Dissect, Analyze, and Interact with Network Packet Data using Wireshark and libpcap capabilities Reviewed by Dump3R H3id3gg3R on 8:41 AM Rating: 5
No, WannaCry Is Not Dead! Hits Honda & Traffic Light Camera System No, WannaCry Is Not Dead! Hits Honda & Traffic Light Camera System Reviewed by Dump3R H3id3gg3R on 7:54 AM Rating: 5
Why So Many Top Hackers Hail from Russia Why So Many Top Hackers Hail from Russia Reviewed by Dump3R H3id3gg3R on 7:35 AM Rating: 5
Understanding Encoding (Beginner’s guide) Understanding Encoding (Beginner’s guide) Reviewed by Dump3R H3id3gg3R on 4:49 AM Rating: 5