Social Recon - Investigate The Online Presence And Footprint Of Someone Social Recon - Investigate The Online Presence And Footprint Of Someone Reviewed by Dump3R H3id3gg3R on 12:44 PM Rating: 5
Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems Reviewed by Dump3R H3id3gg3R on 8:05 AM Rating: 5
Update Your Firefox Browser to Fix a Critical Remotely Exploitable Flaw Update Your Firefox Browser to Fix a Critical Remotely Exploitable Flaw Reviewed by Dump3R H3id3gg3R on 6:24 AM Rating: 5
SocialFish - Ultimate phishing tool with Ngrok integrated SocialFish - Ultimate phishing tool with Ngrok integrated Reviewed by Dump3R H3id3gg3R on 5:15 AM Rating: 5
Snitch - Information Gathering via Dorks Snitch - Information Gathering via Dorks Reviewed by Dump3R H3id3gg3R on 12:35 AM Rating: 5
lanGhost - A LAN dropbox chatbot controllable via Telegram lanGhost - A LAN dropbox chatbot controllable via Telegram Reviewed by Dump3R H3id3gg3R on 12:17 PM Rating: 5
Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US Reviewed by Dump3R H3id3gg3R on 9:38 AM Rating: 5
Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Reviewed by Dump3R H3id3gg3R on 5:37 AM Rating: 5
Cowrie - SSH/Telnet Honeypot Cowrie - SSH/Telnet Honeypot Reviewed by Dump3R H3id3gg3R on 12:41 AM Rating: 5
Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Reviewed by Dump3R H3id3gg3R on 2:07 PM Rating: 5
Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases Reviewed by Dump3R H3id3gg3R on 7:48 AM Rating: 5
File Your Taxes Before Scammers Do It For You File Your Taxes Before Scammers Do It For You Reviewed by Dump3R H3id3gg3R on 7:06 AM Rating: 5
Ethical Hacking with Android: Master Class Ethical Hacking with Android: Master Class Reviewed by Dump3R H3id3gg3R on 6:49 AM Rating: 5
Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner Reviewed by Dump3R H3id3gg3R on 6:04 AM Rating: 5
Injectify - Perform Advanced MiTM Attacks On Websites With Ease Injectify - Perform Advanced MiTM Attacks On Websites With Ease Reviewed by Dump3R H3id3gg3R on 5:20 AM Rating: 5
Nearly 2000 WordPress Websites Infected with a Keylogger Nearly 2000 WordPress Websites Infected with a Keylogger Reviewed by Dump3R H3id3gg3R on 4:46 AM Rating: 5
Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) Reviewed by Dump3R H3id3gg3R on 1:43 AM Rating: 5
AntiCuckoo - A Tool To Detect & Crash Cuckoo Sandbox AntiCuckoo - A Tool To Detect & Crash Cuckoo Sandbox Reviewed by Dump3R H3id3gg3R on 1:20 AM Rating: 5
Digital Forensics Investigation using OS Forensics (Part1) Digital Forensics Investigation using OS Forensics (Part1) Reviewed by Dump3R H3id3gg3R on 11:22 PM Rating: 5
DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker Reviewed by Dump3R H3id3gg3R on 1:47 PM Rating: 5
Manual Post Exploitation on Windows PC (System Command) Manual Post Exploitation on Windows PC (System Command) Reviewed by Dump3R H3id3gg3R on 9:38 AM Rating: 5
Infoga - Email Information Gathering Infoga - Email Information Gathering Reviewed by Dump3R H3id3gg3R on 5:44 AM Rating: 5
usbkill - An Anti-Forensic Kill Switch usbkill - An Anti-Forensic Kill Switch Reviewed by Dump3R H3id3gg3R on 12:27 AM Rating: 5
Twebit - Bitcoin Analysis in Twitter With Machine Learning Twebit - Bitcoin Analysis in Twitter With Machine Learning Reviewed by Dump3R H3id3gg3R on 1:32 PM Rating: 5
First ‘Jackpotting’ Attacks Hit U.S. ATMs First ‘Jackpotting’ Attacks Hit U.S. ATMs Reviewed by Dump3R H3id3gg3R on 11:09 AM Rating: 5
SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages Reviewed by Dump3R H3id3gg3R on 5:40 AM Rating: 5
poet - A Simple Post-Exploitation Tool poet - A Simple Post-Exploitation Tool Reviewed by Dump3R H3id3gg3R on 4:34 PM Rating: 5
Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Reviewed by Dump3R H3id3gg3R on 1:28 PM Rating: 5
Registered at SSA.GOV? Good for You, But Keep Your Guard Up Registered at SSA.GOV? Good for You, But Keep Your Guard Up Reviewed by Dump3R H3id3gg3R on 11:55 AM Rating: 5
Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange Reviewed by Dump3R H3id3gg3R on 11:20 AM Rating: 5
Wavecrack - Web Interface For Password Cracking With Hashcat Wavecrack - Web Interface For Password Cracking With Hashcat Reviewed by Dump3R H3id3gg3R on 5:06 AM Rating: 5
VBScan - VBulletin Vulnerability Scanner VBScan - VBulletin Vulnerability Scanner Reviewed by Dump3R H3id3gg3R on 12:29 AM Rating: 5
Hack the USV: 2017 (CTF Challenge) Hack the USV: 2017 (CTF Challenge) Reviewed by Dump3R H3id3gg3R on 9:44 PM Rating: 5
Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Reviewed by Dump3R H3id3gg3R on 1:20 PM Rating: 5
Forensic Imaging through Encase Imager Forensic Imaging through Encase Imager Reviewed by Dump3R H3id3gg3R on 8:50 AM Rating: 5
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Reviewed by Dump3R H3id3gg3R on 5:38 AM Rating: 5
Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems Reviewed by Dump3R H3id3gg3R on 4:44 AM Rating: 5
Gcat - A Fully Featured Backdoor That Uses Gmail As a C&C Server Gcat - A Fully Featured Backdoor That Uses Gmail As a C&C Server Reviewed by Dump3R H3id3gg3R on 1:51 AM Rating: 5
Yikes! Three armed men tried to rob a Bitcoin Exchange in Canada Yikes! Three armed men tried to rob a Bitcoin Exchange in Canada Reviewed by Dump3R H3id3gg3R on 1:26 AM Rating: 5
EU Antitrust Regulators Fine Qualcomm $1.2 Billion Over Apple Deal EU Antitrust Regulators Fine Qualcomm $1.2 Billion Over Apple Deal Reviewed by Dump3R H3id3gg3R on 1:00 AM Rating: 5
Chronicle: A Meteor Aimed At Planet Threat Intel? Chronicle: A Meteor Aimed At Planet Threat Intel? Reviewed by Dump3R H3id3gg3R on 3:11 PM Rating: 5
Pupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Pupy -  Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Reviewed by Dump3R H3id3gg3R on 1:30 PM Rating: 5
Expert: IoT Botnets the Work of a ‘Vast Minority’ Expert: IoT Botnets the Work of a ‘Vast Minority’ Reviewed by Dump3R H3id3gg3R on 8:08 AM Rating: 5
rbndr - Simple DNS Rebinding Service rbndr - Simple DNS Rebinding Service Reviewed by Dump3R H3id3gg3R on 5:14 AM Rating: 5
Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework Reviewed by Dump3R H3id3gg3R on 4:27 AM Rating: 5
Burpsuite Encoder & Decoder Tutorial Burpsuite Encoder & Decoder Tutorial Reviewed by Dump3R H3id3gg3R on 1:14 AM Rating: 5
CUPP - Common User Passwords Profiler CUPP - Common User Passwords Profiler Reviewed by Dump3R H3id3gg3R on 11:39 PM Rating: 5
Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Reviewed by Dump3R H3id3gg3R on 12:38 PM Rating: 5
Cybersecurity Certification Courses – CISA, CISM, CISSP Cybersecurity Certification Courses – CISA, CISM, CISSP Reviewed by Dump3R H3id3gg3R on 5:55 AM Rating: 5
Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Reviewed by Dump3R H3id3gg3R on 5:39 AM Rating: 5
Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches Reviewed by Dump3R H3id3gg3R on 3:55 AM Rating: 5