TROMMEL - Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities TROMMEL - Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities Reviewed by Dump3R H3id3gg3R on 2:37 PM Rating: 5
WiFi Exploitation with WifiPhisher WiFi Exploitation with WifiPhisher Reviewed by Dump3R H3id3gg3R on 10:13 AM Rating: 5
Hashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility Hashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility Reviewed by Dump3R H3id3gg3R on 6:39 AM Rating: 5
Skipfish - Web Application Security Scanner Skipfish -  Web Application Security Scanner Reviewed by Dump3R H3id3gg3R on 5:06 AM Rating: 5
Firefox 58 to Block Canvas Browser Fingerprinting By Default to Stop Online Tracking Firefox 58 to Block Canvas Browser Fingerprinting By Default to Stop Online Tracking Reviewed by Dump3R H3id3gg3R on 3:41 AM Rating: 5
Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager Reviewed by Dump3R H3id3gg3R on 1:09 AM Rating: 5
Lynis 2.5.7 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.7 - Security Auditing Tool for Unix/Linux Systems Reviewed by Dump3R H3id3gg3R on 2:18 PM Rating: 5
Wait, Do You Really Think That’s A YouTube URL? Spoofing Links On Facebook Wait, Do You Really Think That’s A YouTube URL? Spoofing Links On Facebook Reviewed by Dump3R H3id3gg3R on 11:08 AM Rating: 5
subjack - Hostile Subdomain Takeover tool written in Go subjack - Hostile Subdomain Takeover tool written in Go Reviewed by Dump3R H3id3gg3R on 6:55 AM Rating: 5
WIG - Web Application Information Gathering Tool WIG - Web Application Information Gathering Tool Reviewed by Dump3R H3id3gg3R on 5:50 AM Rating: 5
iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing Reviewed by Dump3R H3id3gg3R on 2:58 AM Rating: 5
Tweep - An Advanced Twitter Scraping Tool Tweep - An Advanced Twitter Scraping Tool Reviewed by Dump3R H3id3gg3R on 2:27 PM Rating: 5
Exitmap - A Fast and Modular Scanner for TOR Exit Relays Exitmap - A Fast and Modular Scanner for TOR Exit Relays Reviewed by Dump3R H3id3gg3R on 6:56 AM Rating: 5
EyeWitness - A Rapid Web Application Triage Tool EyeWitness - A Rapid Web Application Triage Tool Reviewed by Dump3R H3id3gg3R on 2:54 AM Rating: 5
ASLRay - Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying ASLRay - Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying Reviewed by Dump3R H3id3gg3R on 2:37 PM Rating: 5
Hashcat Advance Password Recovery Tool New Release 4.0.0 Hashcat Advance Password Recovery Tool New Release 4.0.0 Reviewed by Dump3R H3id3gg3R on 1:51 PM Rating: 5
MSSQL Penetration Testing with Metasploit MSSQL Penetration Testing with Metasploit Reviewed by Dump3R H3id3gg3R on 9:47 AM Rating: 5
Nikto v2.1.6 - Web Server Scanner Nikto v2.1.6 - Web Server Scanner Reviewed by Dump3R H3id3gg3R on 7:02 AM Rating: 5
MobiSec - Mobile Penetration Testing Distribution MobiSec - Mobile Penetration Testing Distribution Reviewed by Dump3R H3id3gg3R on 3:02 AM Rating: 5
Pentest-Tools-Auto-Installer - A Simple Tool For Installing Pentest Tools And Forensic Tools On Debian / Ubuntu Based OS Pentest-Tools-Auto-Installer - A Simple Tool For Installing Pentest Tools And Forensic Tools On Debian / Ubuntu Based OS Reviewed by Dump3R H3id3gg3R on 2:16 PM Rating: 5
Fear the Reaper, or Reaper Madness? Fear the Reaper, or Reaper Madness? Reviewed by Dump3R H3id3gg3R on 1:51 PM Rating: 5
Bad Rabbit Ransomware using NSA Exploit Bad Rabbit Ransomware using NSA Exploit Reviewed by Dump3R H3id3gg3R on 10:07 AM Rating: 5
Parsero - Robots.txt Audit Tool Parsero - Robots.txt Audit Tool Reviewed by Dump3R H3id3gg3R on 8:41 AM Rating: 5
Rekall v1.7 - Forensic and Incident Response Framework Rekall v1.7 - Forensic and Incident Response Framework Reviewed by Dump3R H3id3gg3R on 7:08 AM Rating: 5
Bad Rabbit Ransomware Uses Leaked 'EternalRomance' NSA Exploit to Spread Bad Rabbit Ransomware Uses Leaked 'EternalRomance' NSA Exploit to Spread Reviewed by Dump3R H3id3gg3R on 4:06 AM Rating: 5
Hacker Turns LG's Smart Home Appliances Into Remote-Controlled Spy Robot Hacker Turns LG's Smart Home Appliances Into Remote-Controlled Spy Robot Reviewed by Dump3R H3id3gg3R on 1:20 AM Rating: 5
sqlmate - Tool which will do what you always expected from SQLmap sqlmate - Tool which will do what you always expected from SQLmap Reviewed by Dump3R H3id3gg3R on 2:26 PM Rating: 5
jQuery Official Blog Hacked — Stay Calm, Library is Safe! jQuery Official Blog Hacked — Stay Calm, Library is Safe! Reviewed by Dump3R H3id3gg3R on 10:11 AM Rating: 5
Comprehensive Guide to Sniffing Comprehensive Guide to Sniffing Reviewed by Dump3R H3id3gg3R on 9:27 AM Rating: 5
SQLiv - Massive SQL Injection Vulnerability Scanner SQLiv - Massive SQL Injection Vulnerability Scanner Reviewed by Dump3R H3id3gg3R on 6:30 AM Rating: 5
Responder - An LLMNR, NBT-NS, and mDNS Poisoner Responder - An LLMNR, NBT-NS, and mDNS Poisoner Reviewed by Dump3R H3id3gg3R on 4:43 AM Rating: 5
How to Uninstall Annoying Apps on Mac? How to Uninstall Annoying Apps on Mac? Reviewed by Dump3R H3id3gg3R on 2:45 AM Rating: 5
ZeroDoor - A Script Written Lazily For Generating Cross-Platform Backdoors ZeroDoor - A Script Written Lazily For Generating Cross-Platform Backdoors Reviewed by Dump3R H3id3gg3R on 2:54 PM Rating: 5
Ncrack - High-Speed Network Authentication Cracker Ncrack - High-Speed Network Authentication Cracker Reviewed by Dump3R H3id3gg3R on 11:01 AM Rating: 5
Halloween offer is Back with a Bang! Flat 75% OFF Halloween offer is Back with a Bang! Flat 75% OFF Reviewed by Dump3R H3id3gg3R on 6:48 AM Rating: 5
Reptile - LKM Linux Rootkit Reptile - LKM Linux Rootkit Reviewed by Dump3R H3id3gg3R on 6:33 AM Rating: 5
Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites Reviewed by Dump3R H3id3gg3R on 11:51 PM Rating: 5
Dell Lost Control of Key Customer Support Domain for a Month in 2017 Dell Lost Control of Key Customer Support Domain for a Month in 2017 Reviewed by Dump3R H3id3gg3R on 8:35 PM Rating: 5
DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys Reviewed by Dump3R H3id3gg3R on 3:11 PM Rating: 5
How To Catch a Cheater How To Catch a Cheater Reviewed by Dump3R H3id3gg3R on 12:44 PM Rating: 5
Bad Rabbit: New Petya-like Ransomware Rapidly Spreading Across Europe Bad Rabbit: New Petya-like Ransomware Rapidly Spreading Across Europe Reviewed by Dump3R H3id3gg3R on 12:09 PM Rating: 5
DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions Reviewed by Dump3R H3id3gg3R on 11:06 AM Rating: 5
Maltrieve - Tool To Retrieve Malware Directly From the Source Maltrieve - Tool To Retrieve Malware Directly From the Source Reviewed by Dump3R H3id3gg3R on 7:50 AM Rating: 5
LeakManager - A Tool To Help You Manage Your Leaks LeakManager - A Tool To Help You Manage Your Leaks Reviewed by Dump3R H3id3gg3R on 6:35 AM Rating: 5
OWASP ZAP 2.6.0 - Penetration Testing Tool for Testing Web Applications OWASP ZAP 2.6.0 - Penetration Testing Tool for Testing Web Applications Reviewed by Dump3R H3id3gg3R on 2:40 PM Rating: 5
Reaper: Calm Before the IoT Security Storm? Reaper: Calm Before the IoT Security Storm? Reviewed by Dump3R H3id3gg3R on 12:56 PM Rating: 5
Kaspersky Opens Antivirus Source Code for Independent Review to Rebuild Trust Kaspersky Opens Antivirus Source Code for Independent Review to Rebuild Trust Reviewed by Dump3R H3id3gg3R on 10:44 AM Rating: 5
Exploit Pack - Penetration Testing Framework Exploit Pack - Penetration Testing Framework Reviewed by Dump3R H3id3gg3R on 6:17 AM Rating: 5
Android getting "DNS over TLS" to prevent ISPs from knowing what websites you visit Android getting "DNS over TLS" to prevent ISPs from knowing what websites you visit Reviewed by Dump3R H3id3gg3R on 1:40 AM Rating: 5
Burp CO2 - A Collection Of Enhancements for Burp Suite Burp CO2 - A Collection Of Enhancements for Burp Suite Reviewed by Dump3R H3id3gg3R on 1:35 AM Rating: 5
Dumb0 - Simple Script To Harvest Usernames In Popular Forums and CMS Dumb0 - Simple Script To Harvest Usernames In Popular Forums and CMS Reviewed by Dump3R H3id3gg3R on 8:44 AM Rating: 5
reflector - Burp plugin able to find reflected XSS on page in real-time while browsing on site reflector - Burp plugin able to find reflected XSS on page in real-time while browsing on site Reviewed by Dump3R H3id3gg3R on 6:39 AM Rating: 5
Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure Reviewed by Dump3R H3id3gg3R on 2:22 AM Rating: 5
ShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently Bypass Firewalls ShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently Bypass Firewalls Reviewed by Dump3R H3id3gg3R on 2:44 PM Rating: 5
Hack the H.A.S.T.E. VM Challenge Hack the H.A.S.T.E. VM Challenge Reviewed by Dump3R H3id3gg3R on 11:57 AM Rating: 5