Social Recon - Investigate The Online Presence And Footprint Of Someone Social Recon - Investigate The Online Presence And Footprint Of Someone Reviewed by Unknown on 12:44 PM Rating: 5
Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems Reviewed by Unknown on 8:05 AM Rating: 5
Update Your Firefox Browser to Fix a Critical Remotely Exploitable Flaw Update Your Firefox Browser to Fix a Critical Remotely Exploitable Flaw Reviewed by Unknown on 6:24 AM Rating: 5
SocialFish - Ultimate phishing tool with Ngrok integrated SocialFish - Ultimate phishing tool with Ngrok integrated Reviewed by Unknown on 5:15 AM Rating: 5
Snitch - Information Gathering via Dorks Snitch - Information Gathering via Dorks Reviewed by Unknown on 12:35 AM Rating: 5
lanGhost - A LAN dropbox chatbot controllable via Telegram lanGhost - A LAN dropbox chatbot controllable via Telegram Reviewed by Unknown on 12:17 PM Rating: 5
Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US Drug Charges Tripped Up Suspects In First Known ATM “Jackpotting” Attacks in the US Reviewed by Unknown on 9:38 AM Rating: 5
Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Reviewed by Unknown on 5:37 AM Rating: 5
Cowrie - SSH/Telnet Honeypot Cowrie - SSH/Telnet Honeypot Reviewed by Unknown on 12:41 AM Rating: 5
Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Reviewed by Unknown on 2:07 PM Rating: 5
Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases Reviewed by Unknown on 7:48 AM Rating: 5
File Your Taxes Before Scammers Do It For You File Your Taxes Before Scammers Do It For You Reviewed by Unknown on 7:06 AM Rating: 5
Ethical Hacking with Android: Master Class Ethical Hacking with Android: Master Class Reviewed by Unknown on 6:49 AM Rating: 5
Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner Reviewed by Unknown on 6:04 AM Rating: 5
Injectify - Perform Advanced MiTM Attacks On Websites With Ease Injectify - Perform Advanced MiTM Attacks On Websites With Ease Reviewed by Unknown on 5:20 AM Rating: 5
Nearly 2000 WordPress Websites Infected with a Keylogger Nearly 2000 WordPress Websites Infected with a Keylogger Reviewed by Unknown on 4:46 AM Rating: 5
Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) Reviewed by Unknown on 1:43 AM Rating: 5
AntiCuckoo - A Tool To Detect & Crash Cuckoo Sandbox AntiCuckoo - A Tool To Detect & Crash Cuckoo Sandbox Reviewed by Unknown on 1:20 AM Rating: 5
Digital Forensics Investigation using OS Forensics (Part1) Digital Forensics Investigation using OS Forensics (Part1) Reviewed by Unknown on 11:22 PM Rating: 5
DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker Reviewed by Unknown on 1:47 PM Rating: 5
Manual Post Exploitation on Windows PC (System Command) Manual Post Exploitation on Windows PC (System Command) Reviewed by Unknown on 9:38 AM Rating: 5
Infoga - Email Information Gathering Infoga - Email Information Gathering Reviewed by Unknown on 5:44 AM Rating: 5
usbkill - An Anti-Forensic Kill Switch usbkill - An Anti-Forensic Kill Switch Reviewed by Unknown on 12:27 AM Rating: 5
Twebit - Bitcoin Analysis in Twitter With Machine Learning Twebit - Bitcoin Analysis in Twitter With Machine Learning Reviewed by Unknown on 1:32 PM Rating: 5
First ‘Jackpotting’ Attacks Hit U.S. ATMs First ‘Jackpotting’ Attacks Hit U.S. ATMs Reviewed by Unknown on 11:09 AM Rating: 5
SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages Reviewed by Unknown on 5:40 AM Rating: 5
poet - A Simple Post-Exploitation Tool poet - A Simple Post-Exploitation Tool Reviewed by Unknown on 4:34 PM Rating: 5
Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Reviewed by Unknown on 1:28 PM Rating: 5
Registered at SSA.GOV? Good for You, But Keep Your Guard Up Registered at SSA.GOV? Good for You, But Keep Your Guard Up Reviewed by Unknown on 11:55 AM Rating: 5
Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange Reviewed by Unknown on 11:20 AM Rating: 5
Wavecrack - Web Interface For Password Cracking With Hashcat Wavecrack - Web Interface For Password Cracking With Hashcat Reviewed by Unknown on 5:06 AM Rating: 5
VBScan - VBulletin Vulnerability Scanner VBScan - VBulletin Vulnerability Scanner Reviewed by Unknown on 12:29 AM Rating: 5
Hack the USV: 2017 (CTF Challenge) Hack the USV: 2017 (CTF Challenge) Reviewed by Unknown on 9:44 PM Rating: 5
Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Reviewed by Unknown on 1:20 PM Rating: 5
Forensic Imaging through Encase Imager Forensic Imaging through Encase Imager Reviewed by Unknown on 8:50 AM Rating: 5
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Reviewed by Unknown on 5:38 AM Rating: 5
Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems Beware! Undetectable CrossRAT malware targets Windows, MacOS, and Linux systems Reviewed by Unknown on 4:44 AM Rating: 5
Gcat - A Fully Featured Backdoor That Uses Gmail As a C&C Server Gcat - A Fully Featured Backdoor That Uses Gmail As a C&C Server Reviewed by Unknown on 1:51 AM Rating: 5
Yikes! Three armed men tried to rob a Bitcoin Exchange in Canada Yikes! Three armed men tried to rob a Bitcoin Exchange in Canada Reviewed by Unknown on 1:26 AM Rating: 5
EU Antitrust Regulators Fine Qualcomm $1.2 Billion Over Apple Deal EU Antitrust Regulators Fine Qualcomm $1.2 Billion Over Apple Deal Reviewed by Unknown on 1:00 AM Rating: 5
Chronicle: A Meteor Aimed At Planet Threat Intel? Chronicle: A Meteor Aimed At Planet Threat Intel? Reviewed by Unknown on 3:11 PM Rating: 5
Pupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Pupy -  Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Reviewed by Unknown on 1:30 PM Rating: 5
Expert: IoT Botnets the Work of a ‘Vast Minority’ Expert: IoT Botnets the Work of a ‘Vast Minority’ Reviewed by Unknown on 8:08 AM Rating: 5
rbndr - Simple DNS Rebinding Service rbndr - Simple DNS Rebinding Service Reviewed by Unknown on 5:14 AM Rating: 5
Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework Critical Flaw Hits Popular Windows Apps Built With Electron JS Framework Reviewed by Unknown on 4:27 AM Rating: 5
Burpsuite Encoder & Decoder Tutorial Burpsuite Encoder & Decoder Tutorial Reviewed by Unknown on 1:14 AM Rating: 5
CUPP - Common User Passwords Profiler CUPP - Common User Passwords Profiler Reviewed by Unknown on 11:39 PM Rating: 5
Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Reviewed by Unknown on 12:38 PM Rating: 5
Cybersecurity Certification Courses – CISA, CISM, CISSP Cybersecurity Certification Courses – CISA, CISM, CISSP Reviewed by Unknown on 5:55 AM Rating: 5
Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Reviewed by Unknown on 5:39 AM Rating: 5
Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches Reviewed by Unknown on 3:55 AM Rating: 5