Magic Unicorn – PowerShell Downgrade Attack and Exploitation tool Magic Unicorn – PowerShell Downgrade Attack and Exploitation tool Reviewed by Dump3R H3id3gg3R on 11:28 AM Rating: 5
SQLMap v1.2.10 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.2.10 - Automatic SQL Injection And Database Takeover Tool Reviewed by Dump3R H3id3gg3R on 5:48 AM Rating: 5
New iPhone Bug Gives Anyone Access to Your Private Photos New iPhone Bug Gives Anyone Access to Your Private Photos Reviewed by Dump3R H3id3gg3R on 12:56 AM Rating: 5
Nameles - Open Source Entropy Based Invalid Traffic Detection And Pre-Bid Filtering Nameles - Open Source Entropy Based Invalid Traffic Detection And Pre-Bid Filtering Reviewed by Dump3R H3id3gg3R on 5:09 PM Rating: 5
Chrome, Firefox, Edge and Safari Plans to Disable TLS 1.0 and 1.1 in 2020 Chrome, Firefox, Edge and Safari Plans to Disable TLS 1.0 and 1.1 in 2020 Reviewed by Dump3R H3id3gg3R on 5:03 PM Rating: 5
ReconDog v2.0 - Reconnaissance Swiss Army Knife ReconDog v2.0 - Reconnaissance Swiss Army Knife Reviewed by Dump3R H3id3gg3R on 5:04 AM Rating: 5
Google to Encrypt Android Cloud Backups With Your Lock Screen Password Google to Encrypt Android Cloud Backups With Your Lock Screen Password Reviewed by Dump3R H3id3gg3R on 2:36 AM Rating: 5
Comprehensive Guide to Dirb Tool Comprehensive Guide to Dirb Tool Reviewed by Dump3R H3id3gg3R on 12:11 AM Rating: 5
Auto-Root-Exploit - Auto Root Exploit Tool Auto-Root-Exploit - Auto Root Exploit Tool Reviewed by Dump3R H3id3gg3R on 3:02 PM Rating: 5
Hack the Box: DevOops Walkthrough Hack the Box: DevOops Walkthrough Reviewed by Dump3R H3id3gg3R on 7:36 AM Rating: 5
Quasar - An Information Gathering Framework For Lazy Penetration Testers Quasar - An Information Gathering Framework For Lazy Penetration Testers Reviewed by Dump3R H3id3gg3R on 5:42 AM Rating: 5
Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys Reviewed by Dump3R H3id3gg3R on 3:04 PM Rating: 5
Metadata-Attacker - A Tool To Generate Media Files With Malicious Metadata Metadata-Attacker - A Tool To Generate Media Files With Malicious Metadata Reviewed by Dump3R H3id3gg3R on 6:20 AM Rating: 5
30 Million Facebook Accounts Were Hacked: Check If You're One of Them 30 Million Facebook Accounts Were Hacked: Check If You're One of Them Reviewed by Dump3R H3id3gg3R on 3:25 AM Rating: 5
Supply Chain Security 101: An Expert’s View Supply Chain Security 101: An Expert’s View Reviewed by Dump3R H3id3gg3R on 6:20 PM Rating: 5
AutoRDPwn - The Shadow Attack Framework AutoRDPwn - The Shadow Attack Framework Reviewed by Dump3R H3id3gg3R on 1:56 PM Rating: 5
Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc Reviewed by Dump3R H3id3gg3R on 5:36 AM Rating: 5
Fortnite for Android Released, But Make Sure You Don't Download Malware Fortnite for Android Released, But Make Sure You Don't Download Malware Reviewed by Dump3R H3id3gg3R on 5:21 AM Rating: 5
Google Adds Control-Flow Integrity to Beef up Android Kernel Security Google Adds Control-Flow Integrity to Beef up Android Kernel Security Reviewed by Dump3R H3id3gg3R on 2:05 AM Rating: 5
Hacking with Empire – PowerShell Post-Exploitation Agent Hacking with Empire – PowerShell Post-Exploitation Agent Reviewed by Dump3R H3id3gg3R on 11:42 PM Rating: 5
Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File Reviewed by Dump3R H3id3gg3R on 2:22 PM Rating: 5
XXRF Shots - Tool to Test SSRF Vulnerabilities XXRF Shots - Tool to Test SSRF Vulnerabilities Reviewed by Dump3R H3id3gg3R on 5:21 AM Rating: 5
French Dark-Web Drug Dealer Sentenced to 20 Years in US Prison French Dark-Web Drug Dealer Sentenced to 20 Years in US Prison Reviewed by Dump3R H3id3gg3R on 2:21 AM Rating: 5
Patch Tuesday, October 2018 Edition Patch Tuesday, October 2018 Edition Reviewed by Dump3R H3id3gg3R on 1:00 AM Rating: 5
Multiple Ways to Exploiting PUT Method Multiple Ways to Exploiting PUT Method Reviewed by Dump3R H3id3gg3R on 11:54 PM Rating: 5
DigiDuck Framework - Framework For Digiduck Development Boards Running ATTiny85 Processors And Micronucleus Bootloader DigiDuck Framework - Framework For Digiduck Development Boards Running ATTiny85 Processors And Micronucleus Bootloader Reviewed by Dump3R H3id3gg3R on 2:21 PM Rating: 5
Why should an organization hire an Information Security professional? Why should an organization hire an Information Security professional? Reviewed by Dump3R H3id3gg3R on 8:20 AM Rating: 5
EKFiddle v.0.8.2 - A Framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising And Malicious Traffic In General EKFiddle v.0.8.2 - A Framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising And Malicious Traffic In General Reviewed by Dump3R H3id3gg3R on 5:18 AM Rating: 5
Just Answering A Video Call Could Compromise Your WhatsApp Account Just Answering A Video Call Could Compromise Your WhatsApp Account Reviewed by Dump3R H3id3gg3R on 12:38 AM Rating: 5
Naming & Shaming Web Polluters: Xiongmai Naming & Shaming Web Polluters: Xiongmai Reviewed by Dump3R H3id3gg3R on 6:04 PM Rating: 5
Clrinject - Injects C# EXE Or DLL Assembly Into Every CLR Runtime And AppDomain Of Another Process Clrinject - Injects C# EXE Or DLL Assembly Into Every CLR Runtime And AppDomain Of Another Process Reviewed by Dump3R H3id3gg3R on 3:01 PM Rating: 5
Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities Reviewed by Dump3R H3id3gg3R on 11:44 AM Rating: 5
Adobe Releases Security Patch Updates for 11 Vulnerabilities Adobe Releases Security Patch Updates for 11 Vulnerabilities Reviewed by Dump3R H3id3gg3R on 10:50 AM Rating: 5
Sandsifter - The X86 Processor Fuzzer Sandsifter - The X86 Processor Fuzzer Reviewed by Dump3R H3id3gg3R on 6:17 AM Rating: 5
From Now On, Only Default Android Apps Can Access Call Log and SMS Data From Now On, Only Default Android Apps Can Access Call Log and SMS Data Reviewed by Dump3R H3id3gg3R on 1:42 AM Rating: 5
Docker TOR Hidden Service - Easily Setup A Hidden Service Inside The Tor Network Docker TOR Hidden Service - Easily Setup A Hidden Service Inside The Tor Network Reviewed by Dump3R H3id3gg3R on 3:49 PM Rating: 5
Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data Reviewed by Dump3R H3id3gg3R on 12:21 PM Rating: 5
New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access Reviewed by Dump3R H3id3gg3R on 8:45 AM Rating: 5
ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones Reviewed by Dump3R H3id3gg3R on 6:32 AM Rating: 5
How to Start a Career in Cybersecurity: All You Need to Know How to Start a Career in Cybersecurity: All You Need to Know Reviewed by Dump3R H3id3gg3R on 6:17 AM Rating: 5
13 Free Movie Download Websites — Watch HD Movies Online 13 Free Movie Download Websites — Watch HD Movies Online Reviewed by Dump3R H3id3gg3R on 6:12 AM Rating: 5
How to Create an Activity Log for WordPress Sites (And Why You Should) How to Create an Activity Log for WordPress Sites (And Why You Should) Reviewed by Dump3R H3id3gg3R on 4:47 AM Rating: 5
DNSDiag - DNS Diagnostics And Performance Measurement Tools DNSDiag - DNS Diagnostics And Performance Measurement Tools Reviewed by Dump3R H3id3gg3R on 2:50 PM Rating: 5
Atlas - Quick SQLMap Tamper Suggester Atlas - Quick SQLMap Tamper Suggester Reviewed by Dump3R H3id3gg3R on 6:29 AM Rating: 5
TakeOver v1 - Extracts CNAME Record Of All Subdomains At Once TakeOver v1 - Extracts CNAME Record Of All Subdomains At Once Reviewed by Dump3R H3id3gg3R on 3:18 PM Rating: 5
Multiple Ways to Detect HTTP Options Multiple Ways to Detect HTTP Options Reviewed by Dump3R H3id3gg3R on 9:06 AM Rating: 5
Dex2Jar - Tools To Work With Android .Dex And Java .Class Files Dex2Jar - Tools To Work With Android .Dex And Java .Class Files Reviewed by Dump3R H3id3gg3R on 5:34 AM Rating: 5
Silk Road Admin, Gary Davis, Pleads Guilty – Could Face Up to 20 Years Silk Road Admin, Gary Davis, Pleads Guilty – Could Face Up to 20 Years Reviewed by Dump3R H3id3gg3R on 12:49 AM Rating: 5
HeapHopper - A Bounded Model Checking Framework For Heap-implementations HeapHopper - A Bounded Model Checking Framework For Heap-implementations Reviewed by Dump3R H3id3gg3R on 2:12 PM Rating: 5
Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? Reviewed by Dump3R H3id3gg3R on 12:58 PM Rating: 5