TROMMEL - Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities TROMMEL - Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities Reviewed by Unknown on 2:37 PM Rating: 5
WiFi Exploitation with WifiPhisher WiFi Exploitation with WifiPhisher Reviewed by Unknown on 10:13 AM Rating: 5
Hashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility Hashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility Reviewed by Unknown on 6:39 AM Rating: 5
Skipfish - Web Application Security Scanner Skipfish -  Web Application Security Scanner Reviewed by Unknown on 5:06 AM Rating: 5
Firefox 58 to Block Canvas Browser Fingerprinting By Default to Stop Online Tracking Firefox 58 to Block Canvas Browser Fingerprinting By Default to Stop Online Tracking Reviewed by Unknown on 3:41 AM Rating: 5
Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager Reviewed by Unknown on 1:09 AM Rating: 5
Lynis 2.5.7 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.7 - Security Auditing Tool for Unix/Linux Systems Reviewed by Unknown on 2:18 PM Rating: 5
Wait, Do You Really Think That’s A YouTube URL? Spoofing Links On Facebook Wait, Do You Really Think That’s A YouTube URL? Spoofing Links On Facebook Reviewed by Unknown on 11:08 AM Rating: 5
subjack - Hostile Subdomain Takeover tool written in Go subjack - Hostile Subdomain Takeover tool written in Go Reviewed by Unknown on 6:55 AM Rating: 5
WIG - Web Application Information Gathering Tool WIG - Web Application Information Gathering Tool Reviewed by Unknown on 5:50 AM Rating: 5
iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing Reviewed by Unknown on 2:58 AM Rating: 5
Tweep - An Advanced Twitter Scraping Tool Tweep - An Advanced Twitter Scraping Tool Reviewed by Unknown on 2:27 PM Rating: 5
Exitmap - A Fast and Modular Scanner for TOR Exit Relays Exitmap - A Fast and Modular Scanner for TOR Exit Relays Reviewed by Unknown on 6:56 AM Rating: 5
EyeWitness - A Rapid Web Application Triage Tool EyeWitness - A Rapid Web Application Triage Tool Reviewed by Unknown on 2:54 AM Rating: 5
ASLRay - Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying ASLRay - Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying Reviewed by Unknown on 2:37 PM Rating: 5
Hashcat Advance Password Recovery Tool New Release 4.0.0 Hashcat Advance Password Recovery Tool New Release 4.0.0 Reviewed by Unknown on 1:51 PM Rating: 5
MSSQL Penetration Testing with Metasploit MSSQL Penetration Testing with Metasploit Reviewed by Unknown on 9:47 AM Rating: 5
Nikto v2.1.6 - Web Server Scanner Nikto v2.1.6 - Web Server Scanner Reviewed by Unknown on 7:02 AM Rating: 5
MobiSec - Mobile Penetration Testing Distribution MobiSec - Mobile Penetration Testing Distribution Reviewed by Unknown on 3:02 AM Rating: 5
Pentest-Tools-Auto-Installer - A Simple Tool For Installing Pentest Tools And Forensic Tools On Debian / Ubuntu Based OS Pentest-Tools-Auto-Installer - A Simple Tool For Installing Pentest Tools And Forensic Tools On Debian / Ubuntu Based OS Reviewed by Unknown on 2:16 PM Rating: 5
Fear the Reaper, or Reaper Madness? Fear the Reaper, or Reaper Madness? Reviewed by Unknown on 1:51 PM Rating: 5
Bad Rabbit Ransomware using NSA Exploit Bad Rabbit Ransomware using NSA Exploit Reviewed by Unknown on 10:07 AM Rating: 5
Parsero - Robots.txt Audit Tool Parsero - Robots.txt Audit Tool Reviewed by Unknown on 8:41 AM Rating: 5
Rekall v1.7 - Forensic and Incident Response Framework Rekall v1.7 - Forensic and Incident Response Framework Reviewed by Unknown on 7:08 AM Rating: 5
Bad Rabbit Ransomware Uses Leaked 'EternalRomance' NSA Exploit to Spread Bad Rabbit Ransomware Uses Leaked 'EternalRomance' NSA Exploit to Spread Reviewed by Unknown on 4:06 AM Rating: 5
Hacker Turns LG's Smart Home Appliances Into Remote-Controlled Spy Robot Hacker Turns LG's Smart Home Appliances Into Remote-Controlled Spy Robot Reviewed by Unknown on 1:20 AM Rating: 5
sqlmate - Tool which will do what you always expected from SQLmap sqlmate - Tool which will do what you always expected from SQLmap Reviewed by Unknown on 2:26 PM Rating: 5
jQuery Official Blog Hacked — Stay Calm, Library is Safe! jQuery Official Blog Hacked — Stay Calm, Library is Safe! Reviewed by Unknown on 10:11 AM Rating: 5
Comprehensive Guide to Sniffing Comprehensive Guide to Sniffing Reviewed by Unknown on 9:27 AM Rating: 5
SQLiv - Massive SQL Injection Vulnerability Scanner SQLiv - Massive SQL Injection Vulnerability Scanner Reviewed by Unknown on 6:30 AM Rating: 5
Responder - An LLMNR, NBT-NS, and mDNS Poisoner Responder - An LLMNR, NBT-NS, and mDNS Poisoner Reviewed by Unknown on 4:43 AM Rating: 5
How to Uninstall Annoying Apps on Mac? How to Uninstall Annoying Apps on Mac? Reviewed by Unknown on 2:45 AM Rating: 5
ZeroDoor - A Script Written Lazily For Generating Cross-Platform Backdoors ZeroDoor - A Script Written Lazily For Generating Cross-Platform Backdoors Reviewed by Unknown on 2:54 PM Rating: 5
Ncrack - High-Speed Network Authentication Cracker Ncrack - High-Speed Network Authentication Cracker Reviewed by Unknown on 11:01 AM Rating: 5
Halloween offer is Back with a Bang! Flat 75% OFF Halloween offer is Back with a Bang! Flat 75% OFF Reviewed by Unknown on 6:48 AM Rating: 5
Reptile - LKM Linux Rootkit Reptile - LKM Linux Rootkit Reviewed by Unknown on 6:33 AM Rating: 5
Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites Reviewed by Unknown on 11:51 PM Rating: 5
Dell Lost Control of Key Customer Support Domain for a Month in 2017 Dell Lost Control of Key Customer Support Domain for a Month in 2017 Reviewed by Unknown on 8:35 PM Rating: 5
DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys DUHK Attack Letting Hackers to Recover Encryption Key: Dont Use Hard Coded Keys Reviewed by Unknown on 3:11 PM Rating: 5
How To Catch a Cheater How To Catch a Cheater Reviewed by Unknown on 12:44 PM Rating: 5
Bad Rabbit: New Petya-like Ransomware Rapidly Spreading Across Europe Bad Rabbit: New Petya-like Ransomware Rapidly Spreading Across Europe Reviewed by Unknown on 12:09 PM Rating: 5
DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions DUHK Attack Lets Hackers Recover Encryption Key Used in VPNs & Web Sessions Reviewed by Unknown on 11:06 AM Rating: 5
Maltrieve - Tool To Retrieve Malware Directly From the Source Maltrieve - Tool To Retrieve Malware Directly From the Source Reviewed by Unknown on 7:50 AM Rating: 5
LeakManager - A Tool To Help You Manage Your Leaks LeakManager - A Tool To Help You Manage Your Leaks Reviewed by Unknown on 6:35 AM Rating: 5
OWASP ZAP 2.6.0 - Penetration Testing Tool for Testing Web Applications OWASP ZAP 2.6.0 - Penetration Testing Tool for Testing Web Applications Reviewed by Unknown on 2:40 PM Rating: 5
Reaper: Calm Before the IoT Security Storm? Reaper: Calm Before the IoT Security Storm? Reviewed by Unknown on 12:56 PM Rating: 5
Kaspersky Opens Antivirus Source Code for Independent Review to Rebuild Trust Kaspersky Opens Antivirus Source Code for Independent Review to Rebuild Trust Reviewed by Unknown on 10:44 AM Rating: 5
Exploit Pack - Penetration Testing Framework Exploit Pack - Penetration Testing Framework Reviewed by Unknown on 6:17 AM Rating: 5
Android getting "DNS over TLS" to prevent ISPs from knowing what websites you visit Android getting "DNS over TLS" to prevent ISPs from knowing what websites you visit Reviewed by Unknown on 1:40 AM Rating: 5
Burp CO2 - A Collection Of Enhancements for Burp Suite Burp CO2 - A Collection Of Enhancements for Burp Suite Reviewed by Unknown on 1:35 AM Rating: 5
Dumb0 - Simple Script To Harvest Usernames In Popular Forums and CMS Dumb0 - Simple Script To Harvest Usernames In Popular Forums and CMS Reviewed by Unknown on 8:44 AM Rating: 5
reflector - Burp plugin able to find reflected XSS on page in real-time while browsing on site reflector - Burp plugin able to find reflected XSS on page in real-time while browsing on site Reviewed by Unknown on 6:39 AM Rating: 5
Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure Reviewed by Unknown on 2:22 AM Rating: 5
ShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently Bypass Firewalls ShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently Bypass Firewalls Reviewed by Unknown on 2:44 PM Rating: 5
Hack the H.A.S.T.E. VM Challenge Hack the H.A.S.T.E. VM Challenge Reviewed by Unknown on 11:57 AM Rating: 5