Pentagon Considers Atomic Reaction to Strike Back for Huge Cyber Attack Pentagon Considers Atomic Reaction to Strike Back for Huge Cyber Attack Reviewed by Dump3R H3id3gg3R on 2:05 AM Rating: 5
Nearly Half of the Norway Population Exposed in HealthCare Data Breach Nearly Half of the Norway Population Exposed in HealthCare Data Breach Reviewed by Dump3R H3id3gg3R on 1:21 AM Rating: 5
BruteX - Automatically Brute force All Services Running On a Target BruteX - Automatically Brute force All Services Running On a Target Reviewed by Dump3R H3id3gg3R on 11:09 PM Rating: 5
Beginners Guide to Burpsuite Payloads (Part 1) Beginners Guide to Burpsuite Payloads (Part 1) Reviewed by Dump3R H3id3gg3R on 9:26 PM Rating: 5
Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs Reviewed by Dump3R H3id3gg3R on 1:29 PM Rating: 5
Hack the Cyberry: 1 VM( Boot2Root Challenge) Hack the  Cyberry: 1 VM( Boot2Root Challenge) Reviewed by Dump3R H3id3gg3R on 5:47 AM Rating: 5
SwishDbgExt - Incident Response & Digital Forensics Debugging Extension SwishDbgExt - Incident Response & Digital Forensics Debugging Extension Reviewed by Dump3R H3id3gg3R on 5:23 AM Rating: 5
MITMf - Framework for Man-In-The-Middle Attacks MITMf - Framework for Man-In-The-Middle Attacks Reviewed by Dump3R H3id3gg3R on 1:29 AM Rating: 5
macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments Reviewed by Dump3R H3id3gg3R on 1:38 PM Rating: 5
Autorize - Automatic Authorization Enforcement Detection Extension For Burp Suite Autorize - Automatic Authorization Enforcement Detection Extension For Burp Suite Reviewed by Dump3R H3id3gg3R on 5:55 AM Rating: 5
Memory Forensics Investigation using Volatility (Part 1) Memory Forensics Investigation using Volatility (Part 1) Reviewed by Dump3R H3id3gg3R on 3:30 AM Rating: 5
15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information 15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information Reviewed by Dump3R H3id3gg3R on 2:55 AM Rating: 5
Proxenet - Hacker-Friendly Proxy for Web Application Pentests Proxenet - Hacker-Friendly Proxy for Web Application Pentests Reviewed by Dump3R H3id3gg3R on 12:22 AM Rating: 5
Hershell - Simple TCP reverse shell written in Go Hershell - Simple TCP reverse shell written in Go Reviewed by Dump3R H3id3gg3R on 12:41 PM Rating: 5
OnePlus confirms up to 40,000 customers affected by Credit Card Breach OnePlus confirms up to 40,000 customers affected by Credit Card Breach Reviewed by Dump3R H3id3gg3R on 9:47 AM Rating: 5
OnionHarvester - A small TOR Onion Address harvester for checking if the address is available or not OnionHarvester - A small TOR Onion Address harvester for checking if the address is available or not Reviewed by Dump3R H3id3gg3R on 5:28 AM Rating: 5
One Complete Comprehensive Ethical Hacking Certification Course One Complete Comprehensive Ethical Hacking Certification Course Reviewed by Dump3R H3id3gg3R on 3:45 AM Rating: 5
Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012 Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012 Reviewed by Dump3R H3id3gg3R on 2:42 AM Rating: 5
SQLiPy - A SQLMap Plugin for Burp Suite SQLiPy - A SQLMap Plugin for Burp Suite Reviewed by Dump3R H3id3gg3R on 11:02 PM Rating: 5
Vegile - Tool for Post exploitation Techniques in Linux Vegile - Tool for Post exploitation Techniques in Linux Reviewed by Dump3R H3id3gg3R on 1:45 PM Rating: 5
Facebook Password Stealing Apps Found on Android Play Store Facebook Password Stealing Apps Found on Android Play Store Reviewed by Dump3R H3id3gg3R on 9:09 AM Rating: 5
EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack Reviewed by Dump3R H3id3gg3R on 5:14 AM Rating: 5
WAIDPS - Wireless Auditing, Intrusion Detection & Prevention System WAIDPS - Wireless Auditing, Intrusion Detection & Prevention System Reviewed by Dump3R H3id3gg3R on 12:05 AM Rating: 5
gOSINT - Open Source Intelligence Framework gOSINT - Open Source Intelligence Framework Reviewed by Dump3R H3id3gg3R on 12:50 PM Rating: 5
Some Basic Rules for Securing Your IoT Stuff Some Basic Rules for Securing Your IoT Stuff Reviewed by Dump3R H3id3gg3R on 11:46 AM Rating: 5
Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware Reviewed by Dump3R H3id3gg3R on 10:32 AM Rating: 5
PentestBox - Portable Penetration Testing Distribution for Windows PentestBox - Portable Penetration Testing Distribution for Windows Reviewed by Dump3R H3id3gg3R on 5:40 AM Rating: 5
One-Lin3r - Gives you one-liners that aids in penetration testing operations One-Lin3r - Gives you one-liners that aids in penetration testing operations Reviewed by Dump3R H3id3gg3R on 5:25 AM Rating: 5
Forensic Investigation of Nmap Scan using Wireshark Forensic Investigation of Nmap Scan using Wireshark Reviewed by Dump3R H3id3gg3R on 2:40 AM Rating: 5
GTScan - The Nmap Scanner for Telco GTScan - The Nmap Scanner for Telco Reviewed by Dump3R H3id3gg3R on 2:02 PM Rating: 5
Skygofree — Powerful Android Spyware Discovered Skygofree — Powerful Android Spyware Discovered Reviewed by Dump3R H3id3gg3R on 8:47 AM Rating: 5
Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Reviewed by Dump3R H3id3gg3R on 5:13 AM Rating: 5
LeakedSource Founder Arrested for Selling 3 Billion Stolen Credentials LeakedSource Founder Arrested for Selling 3 Billion Stolen Credentials Reviewed by Dump3R H3id3gg3R on 4:11 AM Rating: 5
Post Exploitation in Windows using dir Command Post Exploitation in Windows using dir Command Reviewed by Dump3R H3id3gg3R on 2:08 AM Rating: 5
OnePlus Site’s Payment System Hacked: Credit Card Detail Compromised OnePlus Site’s Payment System Hacked: Credit Card Detail Compromised Reviewed by Dump3R H3id3gg3R on 12:45 AM Rating: 5
Flaw in Popular Transmission BitTorrent Client Lets Hackers Control Your PC Remotely Flaw in Popular Transmission BitTorrent Client Lets Hackers Control Your PC Remotely Reviewed by Dump3R H3id3gg3R on 12:30 AM Rating: 5
Web Security Dojo - A Self-Contained Penetration Testing Training Environment Web Security Dojo - A Self-Contained Penetration Testing Training Environment Reviewed by Dump3R H3id3gg3R on 10:46 PM Rating: 5
Serial SWATter Tyler “SWAuTistic” Barriss Charged with Involuntary Manslaughter Serial SWATter Tyler “SWAuTistic” Barriss Charged with Involuntary Manslaughter Reviewed by Dump3R H3id3gg3R on 6:04 PM Rating: 5
Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Reviewed by Dump3R H3id3gg3R on 1:23 PM Rating: 5
OnePlus Site’s Payment System Reportedly Hacked to Steal Credit Card Details OnePlus Site’s Payment System Reportedly Hacked to Steal Credit Card Details Reviewed by Dump3R H3id3gg3R on 10:04 AM Rating: 5
Canadian Police Charge Operator of Hacked Password Service Leakedsource.com Canadian Police Charge Operator of Hacked Password Service Leakedsource.com Reviewed by Dump3R H3id3gg3R on 9:10 AM Rating: 5
OWASP-Nettacker - Automated Penetration Testing Framework OWASP-Nettacker - Automated Penetration Testing Framework Reviewed by Dump3R H3id3gg3R on 5:21 AM Rating: 5
New Mirai Okiru Botnet targets devices running widely-used ARC Processors New Mirai Okiru Botnet targets devices running widely-used ARC Processors Reviewed by Dump3R H3id3gg3R on 3:29 AM Rating: 5
NoPo - The NoSQL Honeypot Framework NoPo - The NoSQL Honeypot Framework Reviewed by Dump3R H3id3gg3R on 12:07 AM Rating: 5
RFCrack - A Software Defined Radio Attack Tool RFCrack - A Software Defined Radio Attack Tool Reviewed by Dump3R H3id3gg3R on 12:57 PM Rating: 5
DNSExfiltrator - Data exfiltration over DNS request covert channel DNSExfiltrator - Data exfiltration over DNS request covert channel Reviewed by Dump3R H3id3gg3R on 4:52 AM Rating: 5
PixieWPS - An Offline WPS Brute-force Utility PixieWPS - An Offline WPS Brute-force Utility Reviewed by Dump3R H3id3gg3R on 2:17 AM Rating: 5
sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) Reviewed by Dump3R H3id3gg3R on 12:40 PM Rating: 5
Forensic Data Carving using Foremost Forensic Data Carving using Foremost Reviewed by Dump3R H3id3gg3R on 9:19 AM Rating: 5
Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts Reviewed by Dump3R H3id3gg3R on 6:33 AM Rating: 5
cSploit Android - The most complete and advanced IT security professional toolkit on Android cSploit Android - The most complete and advanced IT security professional toolkit on Android Reviewed by Dump3R H3id3gg3R on 5:49 AM Rating: 5