Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Nmap Unveiled New Version 6.49 BETA1 Download Now

Nmap Unveiled New Version 6.49 BETA1 Download NowNmap 6.49 BETA1.  This version has hundreds of improvements, including: * 25 new NSE scripts (total is now 494) * Integrated all of your latest OS...

View Article


Image may be NSFW.
Clik here to view.

PunkSPIDER A Global Web Application Vulnerability Search Engine

PunkSPIDER a global web application vulnerability search engine. Deeper, faster, harder scans!Its scan BSQLI, SLI XSS, TRAV, MXI, OSCI, XPATHI  OR, AND vulnerabilities sections step by step.About the...

View Article


Image may be NSFW.
Clik here to view.

YASUO: A Ruby Script That Scans Vulnerable 3rd-Party Web Applications

YASUO: A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network.While working on a network security assessment (internal, external, redteam gigs etc.), we often...

View Article

Image may be NSFW.
Clik here to view.

WIN 2 Free "Hack In Paris" 2015 Conference Tickets

WIN 2 Free "Hack In Paris" 2015 Conference Tickets!HackersOnlineClub is the Media Partner with the Hack In Paris 2015 Conference, which will be held on June 18th and 19th in Paris, France.Just follow...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity: Managing Systems, Conducting Testing, and Investigating...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions ($48.99 Value FREE for a Limited Time!)Cyber Security involves preventative methods to protect information from...

View Article


Image may be NSFW.
Clik here to view.

TurboBytes Pulse Tool To Run Network Diagnostics In Distributed Manner

TurboBytes Pulse Tool To Run Network Diagnostics In Distributed Manner.It is made up of 2 components!CNC : This is the Command & Control server. Users make http requests to it describing the test...

View Article

Image may be NSFW.
Clik here to view.

#Breaking: US Army Official Website Hacked By Syrian Electronic Army

#Breaking: US Army Official Website Hacked By Syrian Electronic Army.Syrian Electronic Army SEA Hacked US Army Website www.army.mil. SEA reports about hacks on their Twitter account.One of #SEA...

View Article

Image may be NSFW.
Clik here to view.

Interview With Cybrary Co-Founder: Ryan Corey

Interview With Ryan Corey: Co-Founder of Cybrary.As we all know Cybrary is providing free IT and Cyber security trainings to everyone. It was launched on January 13, 2015. Today, we interviewed Ryan...

View Article


Image may be NSFW.
Clik here to view.

Hack iOS Mail App: Exploit Working [Video]

Hack iOS Mail App Credentials: Exploit Working [Video]  iOS 8.3 Mail app injection kit!This injection kit pawns every iOS 8.3 Mail app and  it is developed by Jan Soucek. He is exploiting a bug of iOS...

View Article


Image may be NSFW.
Clik here to view.

How Microsoft Can Spy On You And How To Stop It

How Microsoft Can Spy On You And How To Stop It!This Article will explain how they spy on you and how you can stop Microsoft from getting your IP Address without your permission.How Microsoft Can Spy...

View Article

Image may be NSFW.
Clik here to view.

Fuddly: Fuzzing And Data Manipulation Framework

Fuddly: Fuzzing And Data Manipulation FrameworkList of featuresGraph-based data model that enables:To represent complex data formats and also to mix themcomplex data manipulationsto dissect/absorb...

View Article

Image may be NSFW.
Clik here to view.

A Tool To Detect And Crash Cuckoo Sandbox

A Tool To Detect And Crash Cuckoo Sandbox.Tested in Cuckoo Sandbox Official and Accuvant version!FeaturesDetection:Cuckoo hooks detection (all kind of cuckoo hooks).Suspicius data in own memory...

View Article

Image may be NSFW.
Clik here to view.

Nuclide: An Open IDE Experience for Hack development

Nuclide : An open IDE for web and native mobile development, built on top of Atom to Provide Hackability.Nuclide is the first IDE with support for Hack, including autocomplete, jump-to-definition,...

View Article


Image may be NSFW.
Clik here to view.

Blackbone Windows Memory Hacking Library

Blackbone: Windows Memory Hacking LibraryFeaturesx86 and x64 supportProcess interactionManage PEB32/PEB64Manage process through WOW64 barrierProcess MemoryAllocate and free virtual memoryChange memory...

View Article

Image may be NSFW.
Clik here to view.

Whats So Good About Pretty Good Privacy (PGP)?

Whats So Good About Pretty Good Privacy (PGP)?Pretty good privacy a program developed by Philips R.zimmermann in 1991 gained its popularity in encryption-decryption of email over the internet and also...

View Article


Image may be NSFW.
Clik here to view.

Data-Driven Security: Analysis, Visualization And Dashboards ($40.99 Value)...

Data-Driven Security: Analysis, Visualization and Dashboards ($40.99 Value) FREE eBook Available for a limited time!Uncover hidden patterns of data and respond with countermeasures.Security...

View Article

Image may be NSFW.
Clik here to view.

q-shell - Unix Remote Login And Rootkit Shell Tool

q-shell - Unix Remote Login And Rootkit Shell Tool. Quick Shell for Unix administrator!q-shell is quick shell for remote login into Unix system, it use blowfish crypt algorithm to protect transport...

View Article


Image may be NSFW.
Clik here to view.

WATOBO- The Web Application Security Auditing Toolbox For XSS, LFI And SQL...

WATOBO- The Web Application Security Auditing ToolboxWATOBO is a security tool for testing web applications. It is intended to enable security professionals to perform efficient (semi-automated) web...

View Article

Image may be NSFW.
Clik here to view.

Italian Surveillance Company "HackingTeam" Gets Hacked, 400GBs Data Leaked...

Italian Surveillance Company "HackingTeam" Gets Hacked, 400GBs Data Leaked Online!An Italian company which sells spying tools to government and law enforcement agencies has been hacked with 400GB data...

View Article

Image may be NSFW.
Clik here to view.

Security Reimagined: An Adaptive Approach to Cyber Threats for the Digital...

Security Reimagined: An Adaptive Approach to Cyber Threats for the Digital Age (Part 1)Conventional security detects threats too late (if at all), and resolves them too slowly. Organizations need a...

View Article
Browsing all 855 articles
Browse latest View live