CipherScan - Find out which SSL ciphersuites are supported by a target CipherScan - Find out which SSL ciphersuites are supported by a target Reviewed by Dump3R H3id3gg3R on 2:13 PM Rating: 5
ThunderShell - PowerShell based RAT ThunderShell - PowerShell based RAT Reviewed by Dump3R H3id3gg3R on 7:55 AM Rating: 5
VNC Penetration Testing VNC Penetration Testing Reviewed by Dump3R H3id3gg3R on 5:19 AM Rating: 5
Simple Packet Sender - A Linux Packet Crafting Tool Simple Packet Sender - A Linux Packet Crafting Tool Reviewed by Dump3R H3id3gg3R on 3:45 AM Rating: 5
Tails 3.2 - Live System to Preserve Your Privacy and Anonymity Tails 3.2 - Live System to Preserve Your Privacy and Anonymity Reviewed by Dump3R H3id3gg3R on 2:16 PM Rating: 5
Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks Reviewed by Dump3R H3id3gg3R on 11:03 AM Rating: 5
FTP Pivoting through RDP FTP Pivoting through RDP Reviewed by Dump3R H3id3gg3R on 9:58 AM Rating: 5
Here’s What to Ask the Former Equifax CEO Here’s What to Ask the Former Equifax CEO Reviewed by Dump3R H3id3gg3R on 9:53 AM Rating: 5
BloodHound - Six Degrees of Domain Admin BloodHound - Six Degrees of Domain Admin Reviewed by Dump3R H3id3gg3R on 7:30 AM Rating: 5
OSINT SPY: Search Engine For Hackers OSINT SPY: Search Engine For Hackers Reviewed by Dump3R H3id3gg3R on 6:37 AM Rating: 5
Amazon's Whole Foods Market Suffers Credit Card Breach In Some Stores Amazon's Whole Foods Market Suffers Credit Card Breach In Some Stores Reviewed by Dump3R H3id3gg3R on 12:42 AM Rating: 5
DBeaver - Free Universal DataBase Manager and SQL Client DBeaver - Free Universal DataBase Manager and SQL Client Reviewed by Dump3R H3id3gg3R on 2:37 PM Rating: 5
Hackers Exploiting Microsoft Servers to Mine Monero - Makes $63,000 In 3 Months Hackers Exploiting Microsoft Servers to Mine Monero - Makes $63,000 In 3 Months Reviewed by Dump3R H3id3gg3R on 9:45 AM Rating: 5
DEFCON: Offensive Malware Analysis: Dissecting OSX FruitFly DEFCON: Offensive Malware Analysis: Dissecting OSX FruitFly Reviewed by Dump3R H3id3gg3R on 6:53 AM Rating: 5
Dark-Web Drug Dealer Arrested After He Travelled US for World Beard Championships Dark-Web Drug Dealer Arrested After He Travelled US for World Beard Championships Reviewed by Dump3R H3id3gg3R on 6:37 AM Rating: 5
CrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks CrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks Reviewed by Dump3R H3id3gg3R on 6:22 AM Rating: 5
GoldenEye - Denial of Service (DoS) Attack Tool GoldenEye - Denial of Service (DoS) Attack Tool Reviewed by Dump3R H3id3gg3R on 2:48 AM Rating: 5
AhMyth: Android Remote Administration Tool AhMyth: Android Remote Administration Tool Reviewed by Dump3R H3id3gg3R on 1:51 AM Rating: 5
2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw 2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw Reviewed by Dump3R H3id3gg3R on 1:07 AM Rating: 5
PowerShdll - Run PowerShell with rundll32 (Bypass software restrictions) PowerShdll - Run PowerShell with rundll32 (Bypass software restrictions) Reviewed by Dump3R H3id3gg3R on 2:38 PM Rating: 5
radare2 - Unix-Like Reverse Engineering Framework And Commandline Tools radare2 - Unix-Like Reverse Engineering Framework And Commandline Tools Reviewed by Dump3R H3id3gg3R on 6:42 AM Rating: 5
The Pirate Bay Exploits Users' CPU to Mine Superanonymous Cryptocurrency - but Could This Actually Be a Good Thing? The Pirate Bay Exploits Users' CPU to Mine Superanonymous Cryptocurrency - but Could This Actually Be a Good Thing? Reviewed by Dump3R H3id3gg3R on 6:08 AM Rating: 5
Learn How to Use Your Android for Hacking and Penetration Testing Learn How to Use Your Android for Hacking and Penetration Testing Reviewed by Dump3R H3id3gg3R on 5:53 AM Rating: 5
Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack Reviewed by Dump3R H3id3gg3R on 3:51 AM Rating: 5
AIEngine - An Artificial Intelligent Intrusion Detection System Engine AIEngine - An Artificial Intelligent Intrusion Detection System Engine Reviewed by Dump3R H3id3gg3R on 3:25 AM Rating: 5
How To Download YouTube Videos For Free on Windows PC [2017] How To Download YouTube Videos For Free on Windows PC [2017] Reviewed by Dump3R H3id3gg3R on 3:00 AM Rating: 5
Cardiac Scan Authentication — Your Heart As Your Password Cardiac Scan Authentication — Your Heart As Your Password Reviewed by Dump3R H3id3gg3R on 1:52 AM Rating: 5
WordPress Penetration Testing using WPScan & Metasploit WordPress Penetration Testing using WPScan & Metasploit Reviewed by Dump3R H3id3gg3R on 12:25 AM Rating: 5
LiMEaide: Remotely Dump Linux RAM LiMEaide: Remotely Dump Linux RAM Reviewed by Dump3R H3id3gg3R on 12:00 AM Rating: 5
Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards Reviewed by Dump3R H3id3gg3R on 4:59 PM Rating: 5
Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa. Exe2Image - A simple utility to convert EXE files to JPEG images and vice versa. Reviewed by Dump3R H3id3gg3R on 2:52 PM Rating: 5
China Bans WhatsApp Messenger China Bans WhatsApp Messenger Reviewed by Dump3R H3id3gg3R on 9:04 AM Rating: 5
First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges Reviewed by Dump3R H3id3gg3R on 7:10 AM Rating: 5
SCUTUM - Linux Automatic ARP (TCP / UDP / ICMP) Firewall SCUTUM - Linux Automatic ARP (TCP / UDP / ICMP) Firewall Reviewed by Dump3R H3id3gg3R on 6:53 AM Rating: 5
eSports and Cyber Hacking: Correlation or Coincidence? eSports and Cyber Hacking: Correlation or Coincidence? Reviewed by Dump3R H3id3gg3R on 5:38 AM Rating: 5
Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext Apple macOS High Sierra Exploit Lets Hackers Steal Keychain Passwords in Plaintext Reviewed by Dump3R H3id3gg3R on 2:30 AM Rating: 5
Hack the Primer VM (CTF Challenge) Hack the Primer VM (CTF Challenge) Reviewed by Dump3R H3id3gg3R on 1:34 AM Rating: 5
clusterd - Application Server Attack Toolkit clusterd - Application Server Attack Toolkit Reviewed by Dump3R H3id3gg3R on 2:15 PM Rating: 5
Source: Deloitte Breach Affected All Company Email, Admin Accounts Source: Deloitte Breach Affected All Company Email, Admin Accounts Reviewed by Dump3R H3id3gg3R on 2:09 PM Rating: 5
Deloitte Hacked — Cyber Attack Exposes Clients' Secret Emails Deloitte Hacked — Cyber Attack Exposes Clients' Secret Emails Reviewed by Dump3R H3id3gg3R on 10:25 AM Rating: 5
BlackArch Linux - Penetration Testing Distribution BlackArch Linux - Penetration Testing Distribution Reviewed by Dump3R H3id3gg3R on 10:21 AM Rating: 5
Canadian Man Gets 9 Months Detention for Serial Swattings, Bomb Threats Canadian Man Gets 9 Months Detention for Serial Swattings, Bomb Threats Reviewed by Dump3R H3id3gg3R on 9:25 AM Rating: 5
4 ways to SMTP Enumeration 4 ways to SMTP Enumeration Reviewed by Dump3R H3id3gg3R on 9:11 AM Rating: 5
macphish - Office for Mac Macro Payload Generator macphish - Office for Mac Macro Payload Generator Reviewed by Dump3R H3id3gg3R on 7:12 AM Rating: 5
Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server Viacom Left Delicate Information And Secret Key on Unsecured Amazon Server Reviewed by Dump3R H3id3gg3R on 4:47 AM Rating: 5
LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells Reviewed by Dump3R H3id3gg3R on 3:28 PM Rating: 5
Zeus Scanner - Advanced Dork Searching Utility Zeus Scanner - Advanced Dork Searching Utility Reviewed by Dump3R H3id3gg3R on 7:58 AM Rating: 5
Equifax or Equiphish? Equifax or Equiphish? Reviewed by Dump3R H3id3gg3R on 7:44 AM Rating: 5
TCPCopy - A TCP Stream Replay Tool TCPCopy - A TCP Stream Replay Tool Reviewed by Dump3R H3id3gg3R on 3:12 PM Rating: 5
dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS Protocol Reviewed by Dump3R H3id3gg3R on 7:46 AM Rating: 5
Penetration Testing on Telnet (Port 23) Penetration Testing on Telnet (Port 23) Reviewed by Dump3R H3id3gg3R on 4:30 AM Rating: 5
VPNPivot - Explore Internal Networks VPNPivot - Explore Internal Networks Reviewed by Dump3R H3id3gg3R on 2:30 PM Rating: 5
Passwords For 500,000 Car Tracking Devices Leaked Online Passwords For 500,000 Car Tracking Devices Leaked Online Reviewed by Dump3R H3id3gg3R on 9:43 AM Rating: 5
Linux Trojan Using Hacked IoT Devices to Send Spam Emails Linux Trojan Using Hacked IoT Devices to Send Spam Emails Reviewed by Dump3R H3id3gg3R on 9:20 AM Rating: 5
Give Your Creativity a Boost Using the B.U.I.L.D. Model - by Wrike project management tools Give Your Creativity a Boost Using the B.U.I.L.D. Model - by Wrike project management tools Reviewed by Dump3R H3id3gg3R on 7:14 AM Rating: 5
CCleaner Malware Infects Big Tech Companies With Second Backdoor CCleaner Malware Infects Big Tech Companies With Second Backdoor Reviewed by Dump3R H3id3gg3R on 6:40 AM Rating: 5