CipherScan - Find out which SSL ciphersuites are supported by a target CipherScan - Find out which SSL ciphersuites are supported by a target Reviewed by Unknown on 2:13 PM Rating: 5
ThunderShell - PowerShell based RAT ThunderShell - PowerShell based RAT Reviewed by Unknown on 7:55 AM Rating: 5
VNC Penetration Testing VNC Penetration Testing Reviewed by Unknown on 5:19 AM Rating: 5
Simple Packet Sender - A Linux Packet Crafting Tool Simple Packet Sender - A Linux Packet Crafting Tool Reviewed by Unknown on 3:45 AM Rating: 5
Tails 3.2 - Live System to Preserve Your Privacy and Anonymity Tails 3.2 - Live System to Preserve Your Privacy and Anonymity Reviewed by Unknown on 2:16 PM Rating: 5
Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks Reviewed by Unknown on 11:03 AM Rating: 5
FTP Pivoting through RDP FTP Pivoting through RDP Reviewed by Unknown on 9:58 AM Rating: 5
Here’s What to Ask the Former Equifax CEO Here’s What to Ask the Former Equifax CEO Reviewed by Unknown on 9:53 AM Rating: 5
BloodHound - Six Degrees of Domain Admin BloodHound - Six Degrees of Domain Admin Reviewed by Unknown on 7:30 AM Rating: 5
OSINT SPY: Search Engine For Hackers OSINT SPY: Search Engine For Hackers Reviewed by Unknown on 6:37 AM Rating: 5
Amazon's Whole Foods Market Suffers Credit Card Breach In Some Stores Amazon's Whole Foods Market Suffers Credit Card Breach In Some Stores Reviewed by Unknown on 12:42 AM Rating: 5
DBeaver - Free Universal DataBase Manager and SQL Client DBeaver - Free Universal DataBase Manager and SQL Client Reviewed by Unknown on 2:37 PM Rating: 5
Hackers Exploiting Microsoft Servers to Mine Monero - Makes $63,000 In 3 Months Hackers Exploiting Microsoft Servers to Mine Monero - Makes $63,000 In 3 Months Reviewed by Unknown on 9:45 AM Rating: 5
DEFCON: Offensive Malware Analysis: Dissecting OSX FruitFly DEFCON: Offensive Malware Analysis: Dissecting OSX FruitFly Reviewed by Unknown on 6:53 AM Rating: 5
Dark-Web Drug Dealer Arrested After He Travelled US for World Beard Championships Dark-Web Drug Dealer Arrested After He Travelled US for World Beard Championships Reviewed by Unknown on 6:37 AM Rating: 5
CrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks CrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks Reviewed by Unknown on 6:22 AM Rating: 5
GoldenEye - Denial of Service (DoS) Attack Tool GoldenEye - Denial of Service (DoS) Attack Tool Reviewed by Unknown on 2:48 AM Rating: 5
AhMyth: Android Remote Administration Tool AhMyth: Android Remote Administration Tool Reviewed by Unknown on 1:51 AM Rating: 5
2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw 2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw Reviewed by Unknown on 1:07 AM Rating: 5
PowerShdll - Run PowerShell with rundll32 (Bypass software restrictions) PowerShdll - Run PowerShell with rundll32 (Bypass software restrictions) Reviewed by Unknown on 2:38 PM Rating: 5
radare2 - Unix-Like Reverse Engineering Framework And Commandline Tools radare2 - Unix-Like Reverse Engineering Framework And Commandline Tools Reviewed by Unknown on 6:42 AM Rating: 5
The Pirate Bay Exploits Users' CPU to Mine Superanonymous Cryptocurrency - but Could This Actually Be a Good Thing? The Pirate Bay Exploits Users' CPU to Mine Superanonymous Cryptocurrency - but Could This Actually Be a Good Thing? Reviewed by Unknown on 6:08 AM Rating: 5
Learn How to Use Your Android for Hacking and Penetration Testing Learn How to Use Your Android for Hacking and Penetration Testing Reviewed by Unknown on 5:53 AM Rating: 5
Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack Reviewed by Unknown on 3:51 AM Rating: 5
AIEngine - An Artificial Intelligent Intrusion Detection System Engine AIEngine - An Artificial Intelligent Intrusion Detection System Engine Reviewed by Unknown on 3:25 AM Rating: 5
How To Download YouTube Videos For Free on Windows PC [2017] How To Download YouTube Videos For Free on Windows PC [2017] Reviewed by Unknown on 3:00 AM Rating: 5
Cardiac Scan Authentication — Your Heart As Your Password Cardiac Scan Authentication — Your Heart As Your Password Reviewed by Unknown on 1:52 AM Rating: 5
WordPress Penetration Testing using WPScan & Metasploit WordPress Penetration Testing using WPScan & Metasploit Reviewed by Unknown on 12:25 AM Rating: 5
LiMEaide: Remotely Dump Linux RAM LiMEaide: Remotely Dump Linux RAM Reviewed by Unknown on 12:00 AM Rating: 5
Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards Reviewed by Unknown on 4:59 PM Rating: 5
Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa. Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa. Reviewed by Unknown on 2:52 PM Rating: 5
China Bans WhatsApp Messenger China Bans WhatsApp Messenger Reviewed by Unknown on 9:04 AM Rating: 5
First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges Reviewed by Unknown on 7:10 AM Rating: 5
SCUTUM - Linux Automatic ARP (TCP / UDP / ICMP) Firewall SCUTUM - Linux Automatic ARP (TCP / UDP / ICMP) Firewall Reviewed by Unknown on 6:53 AM Rating: 5
eSports and Cyber Hacking: Correlation or Coincidence? eSports and Cyber Hacking: Correlation or Coincidence? Reviewed by Unknown on 5:38 AM Rating: 5
Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext Reviewed by Unknown on 2:30 AM Rating: 5
Hack the Primer VM (CTF Challenge) Hack the Primer VM (CTF Challenge) Reviewed by Unknown on 1:34 AM Rating: 5
clusterd - Application Server Attack Toolkit clusterd - Application Server Attack Toolkit Reviewed by Unknown on 2:15 PM Rating: 5
Source: Deloitte Breach Affected All Company Email, Admin Accounts Source: Deloitte Breach Affected All Company Email, Admin Accounts Reviewed by Unknown on 2:09 PM Rating: 5
Deloitte Hacked — Cyber Attack Exposes Clients' Secret Emails Deloitte Hacked — Cyber Attack Exposes Clients' Secret Emails Reviewed by Unknown on 10:25 AM Rating: 5
BlackArch Linux - Penetration Testing Distribution BlackArch Linux - Penetration Testing Distribution Reviewed by Unknown on 10:21 AM Rating: 5
Canadian Man Gets 9 Months Detention for Serial Swattings, Bomb Threats Canadian Man Gets 9 Months Detention for Serial Swattings, Bomb Threats Reviewed by Unknown on 9:25 AM Rating: 5
4 ways to SMTP Enumeration 4 ways to SMTP Enumeration Reviewed by Unknown on 9:11 AM Rating: 5
macphish - Office for Mac Macro Payload Generator macphish - Office for Mac Macro Payload Generator Reviewed by Unknown on 7:12 AM Rating: 5
Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server Reviewed by Unknown on 4:47 AM Rating: 5
LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells Reviewed by Unknown on 3:28 PM Rating: 5
Zeus Scanner - Advanced Dork Searching Utility Zeus Scanner - Advanced Dork Searching Utility Reviewed by Unknown on 7:58 AM Rating: 5
Equifax or Equiphish? Equifax or Equiphish? Reviewed by Unknown on 7:44 AM Rating: 5
TCPCopy - A TCP Stream Replay Tool TCPCopy - A TCP Stream Replay Tool Reviewed by Unknown on 3:12 PM Rating: 5
dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol Reviewed by Unknown on 7:46 AM Rating: 5
Penetration Testing on Telnet (Port 23) Penetration Testing on Telnet (Port 23) Reviewed by Unknown on 4:30 AM Rating: 5
VPNPivot - Explore Internal Networks VPNPivot - Explore Internal Networks Reviewed by Unknown on 2:30 PM Rating: 5
Passwords For 500,000 Car Tracking Devices Leaked Online Passwords For 500,000 Car Tracking Devices Leaked Online Reviewed by Unknown on 9:43 AM Rating: 5
Linux Trojan Using Hacked IoT Devices to Send Spam Emails Linux Trojan Using Hacked IoT Devices to Send Spam Emails Reviewed by Unknown on 9:20 AM Rating: 5
Give Your Creativity a Boost Using the B.U.I.L.D. Model - by Wrike project management tools Give Your Creativity a Boost Using the B.U.I.L.D. Model - by Wrike project management tools Reviewed by Unknown on 7:14 AM Rating: 5
CCleaner Malware Infects Big Tech Companies With Second Backdoor CCleaner Malware Infects Big Tech Companies With Second Backdoor Reviewed by Unknown on 6:40 AM Rating: 5