M3UAScan - A Scanner for M3UA protocol to detect Sigtran supporting nodes M3UAScan - A Scanner for M3UA protocol to detect Sigtran supporting nodes Reviewed by Dump3R H3id3gg3R on 1:50 PM Rating: 5
Hack The Ether: EvilScience VM (CTF Challenge) Hack The Ether: EvilScience VM (CTF Challenge) Reviewed by Dump3R H3id3gg3R on 7:11 AM Rating: 5
WhatWeb 0.4.9 - Next Generation Web Scanner WhatWeb 0.4.9 - Next Generation Web Scanner Reviewed by Dump3R H3id3gg3R on 5:16 AM Rating: 5
HP Silently Installs Telemetry Bloatware On Your PC—Here's How to Remove It HP Silently Installs Telemetry Bloatware On Your PC—Here's How to Remove It Reviewed by Dump3R H3id3gg3R on 5:01 AM Rating: 5
Command Injection Exploitation using Web Delivery (Linux, Windows) Command Injection Exploitation using Web Delivery (Linux, Windows) Reviewed by Dump3R H3id3gg3R on 4:08 AM Rating: 5
Cryptocurrency Mining Scripts Now Run Even After You Close Your Browser Cryptocurrency Mining Scripts Now Run Even After You Close Your Browser Reviewed by Dump3R H3id3gg3R on 1:30 AM Rating: 5
Cr3dOv3r 0.2 - Know The Dangers Of Credential Reuse Attacks Cr3dOv3r 0.2 - Know The Dangers Of Credential Reuse Attacks Reviewed by Dump3R H3id3gg3R on 12:25 PM Rating: 5
IDS, IPS Penetration Testing Lab Setup with Snort IDS, IPS Penetration Testing Lab Setup with Snort Reviewed by Dump3R H3id3gg3R on 8:09 AM Rating: 5
Amber - POC Reflective PE Packer Amber - POC Reflective PE Packer Reviewed by Dump3R H3id3gg3R on 5:37 AM Rating: 5
mwebfp - Mass Web Fingerprinter mwebfp - Mass Web Fingerprinter Reviewed by Dump3R H3id3gg3R on 3:51 AM Rating: 5
Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs Reviewed by Dump3R H3id3gg3R on 2:19 AM Rating: 5
Hack the Depth VM (CTF Challenge) Hack the Depth VM (CTF Challenge) Reviewed by Dump3R H3id3gg3R on 2:05 AM Rating: 5
Hacker Pleads Guilty to 2014 Yahoo Breach, Admits Helping Russia Intelligence Hacker Pleads Guilty to 2014 Yahoo Breach, Admits Helping Russia Intelligence Reviewed by Dump3R H3id3gg3R on 12:51 AM Rating: 5
macOS High Sierra Bug Lets Anyone Gain Root Access Without a Password macOS High Sierra Bug Lets Anyone Gain Root Access Without a Password Reviewed by Dump3R H3id3gg3R on 10:28 PM Rating: 5
MacOS High Sierra Users: Change Root Password Now MacOS High Sierra Users: Change Root Password Now Reviewed by Dump3R H3id3gg3R on 2:55 PM Rating: 5
WPSploit - WordPress Plugin Code Scanner WPSploit - WordPress Plugin Code Scanner Reviewed by Dump3R H3id3gg3R on 12:57 PM Rating: 5
New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina Reviewed by Dump3R H3id3gg3R on 6:32 AM Rating: 5
Pipe Finder - Automated script to search in SMB protocol for availables pipe names Pipe Finder - Automated script to search in SMB protocol for availables pipe names Reviewed by Dump3R H3id3gg3R on 6:01 AM Rating: 5
MASSCAN - Mass IP Port Scanner MASSCAN - Mass IP Port Scanner Reviewed by Dump3R H3id3gg3R on 5:06 AM Rating: 5
Google Detects Android Spyware That Spies On WhatsApp, Skype Calls Google Detects Android Spyware That Spies On WhatsApp, Skype Calls Reviewed by Dump3R H3id3gg3R on 1:33 AM Rating: 5
U.S. Charges Three Chinese Hackers for Hacking Siemens, Trimble & Moody U.S. Charges Three Chinese Hackers for Hacking Siemens, Trimble & Moody Reviewed by Dump3R H3id3gg3R on 12:18 AM Rating: 5
net-Shield - An Easy and Simple Anti-DDoS solution for VPS, Dedicated Servers and IoT devices net-Shield - An Easy and Simple Anti-DDoS solution for VPS, Dedicated Servers and IoT devices Reviewed by Dump3R H3id3gg3R on 1:53 PM Rating: 5
Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools? Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools? Reviewed by Dump3R H3id3gg3R on 9:23 AM Rating: 5
Feds Seize Over 20,500 Domain Names For Selling Counterfeit Products Feds Seize Over 20,500 Domain Names For Selling Counterfeit Products Reviewed by Dump3R H3id3gg3R on 8:05 AM Rating: 5
Hack the G0rmint VM (CTF Challenge) Hack the G0rmint VM (CTF Challenge) Reviewed by Dump3R H3id3gg3R on 7:01 AM Rating: 5
Gladius Shows Promise in Utilizing Blockchain Tech to Fight Hackers Gladius Shows Promise in Utilizing Blockchain Tech to Fight Hackers Reviewed by Dump3R H3id3gg3R on 5:55 AM Rating: 5
Zeus-Scanner - Advanced Reconnaissance Utility Zeus-Scanner - Advanced Reconnaissance Utility Reviewed by Dump3R H3id3gg3R on 5:50 AM Rating: 5
Another Facebook Bug Allowed Anyone to Delete Your Photos Another Facebook Bug Allowed Anyone to Delete Your Photos Reviewed by Dump3R H3id3gg3R on 5:06 AM Rating: 5
Android Mobile Exploitation with Evil-Droid Android Mobile Exploitation with Evil-Droid Reviewed by Dump3R H3id3gg3R on 4:41 AM Rating: 5
World's Biggest Botnet Just Sent 12.5 Million Emails With Scarab Ransomware World's Biggest Botnet Just Sent 12.5 Million Emails With Scarab Ransomware Reviewed by Dump3R H3id3gg3R on 2:50 AM Rating: 5
Exim Internet Mailer Found Vulnerable to RCE And DoS Bugs; Patch Now Exim Internet Mailer Found Vulnerable to RCE And DoS Bugs; Patch Now Reviewed by Dump3R H3id3gg3R on 1:30 AM Rating: 5
TeleShadow 2 - Telegram Desktop Session Stealer TeleShadow 2 - Telegram Desktop Session Stealer Reviewed by Dump3R H3id3gg3R on 1:25 AM Rating: 5
TeleShadow v2 - Advanced Telegram Desktop Session Hijacker! TeleShadow v2 -  Advanced Telegram Desktop Session Hijacker! Reviewed by Dump3R H3id3gg3R on 1:14 PM Rating: 5
ysoserial.net - Deserialization payload generator for a variety of .NET formatters ysoserial.net - Deserialization payload generator for a variety of .NET formatters Reviewed by Dump3R H3id3gg3R on 5:50 AM Rating: 5
WPHardening - Fortify the Security Of Any WordPress Installation WPHardening - Fortify the Security Of Any WordPress Installation Reviewed by Dump3R H3id3gg3R on 2:14 AM Rating: 5
The Endorser - An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills The Endorser - An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills Reviewed by Dump3R H3id3gg3R on 2:09 PM Rating: 5
DR.CHECKER - A Soundy Vulnerability Detection Tool for Linux Kernel Drivers DR.CHECKER - A Soundy Vulnerability Detection Tool for Linux Kernel Drivers Reviewed by Dump3R H3id3gg3R on 5:49 AM Rating: 5
Imgur—Popular Image Sharing Site Was Hacked In 2014; Passwords Compromised Imgur—Popular Image Sharing Site Was Hacked In 2014; Passwords Compromised Reviewed by Dump3R H3id3gg3R on 12:32 AM Rating: 5
PHP Secure Configuration Checker - Tool for Checking the PHP Configuration for Potential Security Flaws PHP Secure Configuration Checker - Tool for Checking the PHP Configuration for Potential Security Flaws Reviewed by Dump3R H3id3gg3R on 12:06 AM Rating: 5
EmbedInHTML - Embed and hide any file in an HTML file EmbedInHTML - Embed and hide any file in an HTML file Reviewed by Dump3R H3id3gg3R on 12:46 PM Rating: 5
DBC2 (DropboxC2) - A Modular Post-Exploitation Tool, Composed Of An Agent Running On The Victim'S Machine DBC2 (DropboxC2) - A Modular Post-Exploitation Tool, Composed Of An Agent Running On The Victim'S Machine Reviewed by Dump3R H3id3gg3R on 5:30 AM Rating: 5
Name+DOB+SSN=FAFSA Data Gold Mine Name+DOB+SSN=FAFSA Data Gold Mine Reviewed by Dump3R H3id3gg3R on 5:25 AM Rating: 5
Mobius Forensic Toolkit - Forensics Framework To Manage Cases & Case Items Mobius Forensic Toolkit - Forensics Framework To Manage Cases & Case Items Reviewed by Dump3R H3id3gg3R on 10:25 PM Rating: 5
DDEtect - Simple DDE Object Detector DDEtect - Simple DDE  Object Detector Reviewed by Dump3R H3id3gg3R on 1:19 PM Rating: 5
ParanoiDF - A PDF Analysis Suite ParanoiDF - A PDF Analysis Suite Reviewed by Dump3R H3id3gg3R on 12:34 PM Rating: 5
Understanding Guide to Nmap Firewall Scan (Part 1) Understanding Guide to Nmap Firewall Scan (Part 1) Reviewed by Dump3R H3id3gg3R on 7:45 AM Rating: 5
MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware Reviewed by Dump3R H3id3gg3R on 7:41 AM Rating: 5
sAINT - A Spyware Generator for Windows systems written in Java sAINT - A Spyware Generator for Windows systems written in Java Reviewed by Dump3R H3id3gg3R on 5:36 AM Rating: 5
Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now Reviewed by Dump3R H3id3gg3R on 12:37 AM Rating: 5