Prithvi - A Report Generation Tool For Security Assessment Prithvi - A Report Generation Tool For Security Assessment Reviewed by Unknown on 1:33 PM Rating: 5
Apple Moves iCloud Data and Encryption Keys for Chinese Users to China Apple Moves iCloud Data and Encryption Keys for Chinese Users to China Reviewed by Unknown on 8:16 AM Rating: 5
How to Fight Mobile Number Port-out Scams How to Fight Mobile Number Port-out Scams Reviewed by Unknown on 7:06 AM Rating: 5
A Simple Bug Revealed Admins of Facebook Pages — Find Out How A Simple Bug Revealed Admins of Facebook Pages — Find Out How Reviewed by Unknown on 6:39 AM Rating: 5
Ninja Shell - Port Knocking Technique With AES256-GCM Ninja Shell - Port Knocking Technique With AES256-GCM Reviewed by Unknown on 5:28 AM Rating: 5
Memcached Servers Abused for Massive Amplification DDoS Attacks Memcached Servers Abused for Massive Amplification DDoS Attacks Reviewed by Unknown on 11:01 PM Rating: 5
Gryffin - Web Security Scanning Platform Gryffin - Web Security Scanning Platform Reviewed by Unknown on 10:23 PM Rating: 5
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Reviewed by Unknown on 1:15 PM Rating: 5
Bot Roundup: Avalanche, Kronos, NanoCore Bot Roundup: Avalanche, Kronos, NanoCore Reviewed by Unknown on 11:23 AM Rating: 5
WAScan - Web Application Scanner WAScan - Web Application Scanner Reviewed by Unknown on 5:18 AM Rating: 5
Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence Reviewed by Unknown on 4:39 AM Rating: 5
Phone-Cracking Firm Found a Way to Unlock Any iPhone Model Phone-Cracking Firm Found a Way to Unlock Any iPhone Model Reviewed by Unknown on 11:20 PM Rating: 5
Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes Reviewed by Unknown on 1:14 PM Rating: 5
USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online Reviewed by Unknown on 11:52 AM Rating: 5
Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely Flaw in Popular μTorrent Software Lets Hackers Control Your PC Remotely Reviewed by Unknown on 7:42 AM Rating: 5
PoT - Phishing On Twitter PoT - Phishing On Twitter Reviewed by Unknown on 5:31 AM Rating: 5
Android P Will Block Background Apps from Accessing Your Camera, Microphone Android P Will Block Background Apps from Accessing Your Camera, Microphone Reviewed by Unknown on 12:46 AM Rating: 5
DNSteal - DNS Exfiltration Tool for Stealthily Sending Files Over DNS Requests DNSteal - DNS Exfiltration Tool for Stealthily Sending Files Over DNS Requests Reviewed by Unknown on 10:00 PM Rating: 5
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network Reviewed by Unknown on 1:44 PM Rating: 5
contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities Reviewed by Unknown on 5:33 AM Rating: 5
Sn1per - Automated Pentest Recon Scanner Sn1per - Automated Pentest Recon Scanner Reviewed by Unknown on 12:04 AM Rating: 5
meg+ - Automated Reconnaissance Wrapper meg+ - Automated Reconnaissance Wrapper Reviewed by Unknown on 1:35 PM Rating: 5
Droopescan - Plugin Based CMS Security Scanner Droopescan - Plugin Based CMS Security Scanner Reviewed by Unknown on 7:36 AM Rating: 5
meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) Reviewed by Unknown on 5:29 AM Rating: 5
Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Reviewed by Unknown on 12:57 PM Rating: 5
Total Network Inventory 3: Keep Your Network Updated! Total Network Inventory 3: Keep Your Network Updated! Reviewed by Unknown on 7:11 AM Rating: 5
Invoke-Obfuscation - PowerShell Obfuscator Invoke-Obfuscation - PowerShell Obfuscator Reviewed by Unknown on 5:18 AM Rating: 5
Sonar.js - A Framework for Identifying and Launching Exploits Against Internal Network Hosts Sonar.js - A Framework for Identifying and Launching Exploits Against Internal Network Hosts Reviewed by Unknown on 1:17 AM Rating: 5
Chase ‘Glitch’ Exposed Customer Accounts Chase ‘Glitch’ Exposed Customer Accounts Reviewed by Unknown on 5:01 PM Rating: 5
Mitm6 - Pwning IPv4 Via IPv6 Mitm6 - Pwning IPv4 Via IPv6 Reviewed by Unknown on 12:18 PM Rating: 5
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies Reviewed by Unknown on 5:23 AM Rating: 5
Intrigue-core - Framework for Automated Attack Surface Discovery Intrigue-core - Framework for Automated Attack Surface Discovery Reviewed by Unknown on 9:34 PM Rating: 5
BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website Reviewed by Unknown on 12:57 PM Rating: 5
Findsploit - Find Exploits In Local And Online Databases Instantly Findsploit - Find Exploits In Local And Online Databases Instantly Reviewed by Unknown on 5:44 AM Rating: 5
Empire - PowerShell and Python Post-Exploitation Agent Empire - PowerShell and Python Post-Exploitation Agent Reviewed by Unknown on 11:40 PM Rating: 5
MADLIRA - Malware detection using learning and information retrieval for Android MADLIRA - Malware detection using learning and information retrieval for Android Reviewed by Unknown on 12:58 PM Rating: 5
The 26 Hour Complete JavaScript Developer Course - Beginner to Advanced The 26 Hour Complete JavaScript Developer Course - Beginner to Advanced Reviewed by Unknown on 8:10 AM Rating: 5
Disadvantages of Open Source eCommerce Software Disadvantages of Open Source eCommerce Software Reviewed by Unknown on 8:06 AM Rating: 5
Learn Man in the Middle Attack From Scratch Learn Man in the Middle Attack From Scratch Reviewed by Unknown on 6:04 AM Rating: 5
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities Reviewed by Unknown on 4:56 AM Rating: 5
Money Laundering Via Author Impersonation on Amazon? Money Laundering Via Author Impersonation on Amazon? Reviewed by Unknown on 4:08 AM Rating: 5
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking Reviewed by Unknown on 1:55 PM Rating: 5
IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts Reviewed by Unknown on 6:58 AM Rating: 5
Gobuster - Directory/File & DNS Busting Tool Written In Go Gobuster - Directory/File & DNS Busting Tool Written In Go Reviewed by Unknown on 4:46 AM Rating: 5
AutoBrowser - Create Report and Screenshots of HTTP/S Based Ports on the Network AutoBrowser - Create Report and Screenshots of HTTP/S Based Ports on the Network Reviewed by Unknown on 12:53 AM Rating: 5
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Reviewed by Unknown on 1:32 PM Rating: 5
PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram Reviewed by Unknown on 5:43 AM Rating: 5
sshLooter - Script To Steal Passwords From SSH sshLooter - Script To Steal Passwords From SSH Reviewed by Unknown on 1:34 PM Rating: 5
ezsploit - Linux Bash Script Automation For Metasploit ezsploit - Linux Bash Script Automation For Metasploit Reviewed by Unknown on 5:48 AM Rating: 5