Flaw in LinkedIn AutoFill Plugin Lets Third-Party Sites Steal Your Data Flaw in LinkedIn AutoFill Plugin Lets Third-Party Sites Steal Your Data Reviewed by Dump3R H3id3gg3R on 7:45 AM Rating: 5
How to Turn Your Old DVD Disc into Digital [2018] How to Turn Your Old DVD Disc into Digital [2018] Reviewed by Dump3R H3id3gg3R on 7:39 AM Rating: 5
JCS - Joomla Vulnerability Component Scanner JCS - Joomla Vulnerability Component Scanner Reviewed by Dump3R H3id3gg3R on 7:34 AM Rating: 5
British Schoolboy Who Hacked CIA Director Gets 2-Year Prison Term British Schoolboy Who Hacked CIA Director Gets 2-Year Prison Term Reviewed by Dump3R H3id3gg3R on 7:29 AM Rating: 5
How Can Manufacturing Companies Improve Network Access and Security? How Can Manufacturing Companies Improve Network Access and Security? Reviewed by Dump3R H3id3gg3R on 7:24 AM Rating: 5
Is Facebook’s Anti-Abuse System Broken? Is Facebook’s Anti-Abuse System Broken? Reviewed by Dump3R H3id3gg3R on 7:19 AM Rating: 5
SMBrute - SMB Protocol Bruteforce SMBrute - SMB Protocol Bruteforce Reviewed by Dump3R H3id3gg3R on 7:13 AM Rating: 5
PenCrawLer - An Advanced Web Crawler And DirBuster PenCrawLer - An Advanced Web Crawler And DirBuster Reviewed by Dump3R H3id3gg3R on 1:59 PM Rating: 5
Over 2 Million Users Installed Malicious Ad Blockers From Chrome Store Over 2 Million Users Installed Malicious Ad Blockers From Chrome Store Reviewed by Dump3R H3id3gg3R on 11:56 AM Rating: 5
Sandcat Browser 6.0 - Pentest And Developer-Oriented Web Browser Sandcat Browser 6.0 - Pentest And Developer-Oriented Web Browser Reviewed by Dump3R H3id3gg3R on 6:02 AM Rating: 5
Facebook Plans to Build Its Own Chips For Hardware Devices Facebook Plans to Build Its Own Chips For Hardware Devices Reviewed by Dump3R H3id3gg3R on 5:05 AM Rating: 5
'iTunes Wi-Fi Sync' Feature Could Let Attackers Hijack Your iPhone, iPad Remotely 'iTunes Wi-Fi Sync' Feature Could Let Attackers Hijack Your iPhone, iPad Remotely Reviewed by Dump3R H3id3gg3R on 3:55 AM Rating: 5
Another Critical Flaw Found In Drupal Core—Patch Your Sites Immediately Another Critical Flaw Found In Drupal Core—Patch Your Sites Immediately Reviewed by Dump3R H3id3gg3R on 12:34 AM Rating: 5
ATSCAN - Advanced Search & Mass Exploit Scanner ATSCAN - Advanced Search & Mass Exploit Scanner Reviewed by Dump3R H3id3gg3R on 10:35 PM Rating: 5
Subfinder - Subdomain Discovery Tool That Can Discover Massive Amounts Of Valid Subdomains For Any Target Subfinder - Subdomain Discovery Tool That Can Discover Massive Amounts Of Valid Subdomains For Any Target Reviewed by Dump3R H3id3gg3R on 1:56 PM Rating: 5
Critical Unpatched RCE Flaw Disclosed in LG Network Storage Devices Critical Unpatched RCE Flaw Disclosed in LG Network Storage Devices Reviewed by Dump3R H3id3gg3R on 9:51 AM Rating: 5
A Sobering Look at Fake Online Reviews A Sobering Look at Fake Online Reviews Reviewed by Dump3R H3id3gg3R on 9:24 AM Rating: 5
Suspected 'Big Bitcoin Heist' Mastermind Fled to Sweden On Icelandic PM's Plane Suspected 'Big Bitcoin Heist' Mastermind Fled to Sweden On Icelandic PM's Plane Reviewed by Dump3R H3id3gg3R on 7:10 AM Rating: 5
Linux Exploit Suggester - Linux Privilege Escalation Auditing Tool Linux Exploit Suggester - Linux Privilege Escalation Auditing Tool Reviewed by Dump3R H3id3gg3R on 6:02 AM Rating: 5
Hackers Exploiting Drupal Vulnerability to Inject Cryptocurrency Miners Hackers Exploiting Drupal Vulnerability to Inject Cryptocurrency Miners Reviewed by Dump3R H3id3gg3R on 3:01 AM Rating: 5
CCleaner Attack Timeline—Here's How Hackers Infected 2.3 Million PCs CCleaner Attack Timeline—Here's How Hackers Infected 2.3 Million PCs Reviewed by Dump3R H3id3gg3R on 12:41 AM Rating: 5
ROPgadget - This Tool Lets You Search Your Gadgets On Your Binaries To Facilitate Your ROP Exploitation ROPgadget - This Tool Lets You Search Your Gadgets On Your Binaries To Facilitate Your ROP Exploitation Reviewed by Dump3R H3id3gg3R on 2:18 PM Rating: 5
Flashlight - Automated Information Gathering Tool for Penetration Testers Flashlight - Automated Information Gathering Tool for Penetration Testers Reviewed by Dump3R H3id3gg3R on 12:40 PM Rating: 5
Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning Reviewed by Dump3R H3id3gg3R on 10:39 AM Rating: 5
GPG Reaper - Obtain/Steal/Restore GPG Private Keys From Gpg-Agent Cache/Memory GPG Reaper - Obtain/Steal/Restore GPG Private Keys From Gpg-Agent Cache/Memory Reviewed by Dump3R H3id3gg3R on 10:35 AM Rating: 5
Microsoft built its own custom Linux OS to secure IoT devices Microsoft built its own custom Linux OS to secure IoT devices Reviewed by Dump3R H3id3gg3R on 10:29 AM Rating: 5
Deleted Facebook Cybercrime Groups Had 300,000 Members Deleted Facebook Cybercrime Groups Had 300,000 Members Reviewed by Dump3R H3id3gg3R on 4:06 PM Rating: 5
Hashtopolis - A Hashcat Wrapper For Distributed Hashcracking Hashtopolis - A Hashcat Wrapper For Distributed Hashcracking Reviewed by Dump3R H3id3gg3R on 1:37 PM Rating: 5
Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan Reviewed by Dump3R H3id3gg3R on 7:25 AM Rating: 5
Biggest Social Media Network Lost User’s Trust Biggest Social Media Network Lost User’s Trust Reviewed by Dump3R H3id3gg3R on 6:13 AM Rating: 5
Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis Reviewed by Dump3R H3id3gg3R on 5:39 AM Rating: 5
Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer Reviewed by Dump3R H3id3gg3R on 3:19 AM Rating: 5
Ares - Python Botnet and Backdoor Ares - Python Botnet and Backdoor Reviewed by Dump3R H3id3gg3R on 2:03 AM Rating: 5
MalScan - A Simple PE File Heuristics Scanners MalScan - A Simple PE File Heuristics Scanners Reviewed by Dump3R H3id3gg3R on 4:24 PM Rating: 5
AWS Pwn - A Collection Of AWS Penetration Testing Junk AWS Pwn - A Collection Of AWS Penetration Testing Junk Reviewed by Dump3R H3id3gg3R on 9:24 AM Rating: 5
Rp++ - Tool That Aims To Find ROP Sequences In PE/Elf/Mach-O X86/X64 Binaries Rp++ - Tool That Aims To Find ROP Sequences In PE/Elf/Mach-O X86/X64 Binaries Reviewed by Dump3R H3id3gg3R on 3:20 PM Rating: 5
Mimic - A Tool For Covert Execution In Linux Mimic - A Tool For Covert Execution In Linux Reviewed by Dump3R H3id3gg3R on 6:13 AM Rating: 5
Hackers Have Started Exploiting Drupal RCE Exploit Released Yesterday Hackers Have Started Exploiting Drupal RCE Exploit Released Yesterday Reviewed by Dump3R H3id3gg3R on 1:37 AM Rating: 5
ReconCat - Tool To Fetch Archive Url Snapshots From Archive.org ReconCat - Tool To Fetch Archive Url Snapshots From Archive.org Reviewed by Dump3R H3id3gg3R on 3:28 PM Rating: 5
Hackers Found Using A New Code Injection Technique to Evade Detection Hackers Found Using A New Code Injection Technique to Evade Detection Reviewed by Dump3R H3id3gg3R on 3:24 PM Rating: 5
Mosca - Static Analysis Tool To Find Bugs Mosca - Static Analysis Tool To Find Bugs Reviewed by Dump3R H3id3gg3R on 3:19 PM Rating: 5
JShielder - Automates The Process Of Installing All The Necessary Packages To Host A Web Application And Hardening A Linux Server JShielder - Automates The Process Of Installing All The Necessary Packages To Host A Web Application And Hardening A Linux Server Reviewed by Dump3R H3id3gg3R on 6:15 AM Rating: 5
Popular Android Phone Manufacturers Caught Lying About Security Updates Popular Android Phone Manufacturers Caught Lying About Security Updates Reviewed by Dump3R H3id3gg3R on 5:40 AM Rating: 5
Libsodium - A Modern, Portable, Easy To Use Crypto Library Libsodium - A Modern, Portable, Easy To Use Crypto Library Reviewed by Dump3R H3id3gg3R on 1:42 PM Rating: 5
Hacker Can Steal Data from Air-Gapped Computers through Power Lines Hacker Can Steal Data from Air-Gapped Computers through Power Lines Reviewed by Dump3R H3id3gg3R on 8:41 AM Rating: 5
Git-All-Secrets - A Tool To Capture All The Git Secrets By Leveraging Multiple Open Source Git Searching Tools Git-All-Secrets - A Tool To Capture All The Git Secrets By Leveraging Multiple Open Source Git Searching Tools Reviewed by Dump3R H3id3gg3R on 6:30 AM Rating: 5
Flaw in Microsoft Outlook Lets Hackers Easily Steal Your Windows Password Flaw in Microsoft Outlook Lets Hackers Easily Steal Your Windows Password Reviewed by Dump3R H3id3gg3R on 12:45 AM Rating: 5
M0B-tool - Auto Detect CMS And Exploit M0B-tool - Auto Detect CMS And Exploit Reviewed by Dump3R H3id3gg3R on 2:04 PM Rating: 5
When Identity Thieves Hack Your Accountant When Identity Thieves Hack Your Accountant Reviewed by Dump3R H3id3gg3R on 11:27 AM Rating: 5
Mercury - A Hacking Tool Used To Collect Information And Use The Information To Further Hurt The Target Mercury - A Hacking Tool Used To Collect Information And Use The Information To Further Hurt The Target Reviewed by Dump3R H3id3gg3R on 6:28 AM Rating: 5
JoomlaVS - A Black Box, Ruby Powered, Joomla Vulnerability Scanner JoomlaVS - A Black Box, Ruby Powered, Joomla Vulnerability Scanner Reviewed by Dump3R H3id3gg3R on 12:04 AM Rating: 5