Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

AutoNessus: A Script To Communicate With Nessus API

AutoNessus: A Script To Communicate With Nessus APIAutoNessus is a script that communicates only with the Nessus API. The main goal is to help with automating scans. We can easily list all the scans,...

View Article


Image may be NSFW.
Clik here to view.

Apple Watch Comes Out In The Lead of Fitness Tracker Privacy And Security

Apple Watch Comes Out In The Lead of Fitness Tracker Privacy And SecurityAccording to the new study shows, if we talk about the privacy and security of user data, then the Apple Watch and its...

View Article


Image may be NSFW.
Clik here to view.

Hackers Are Using New Tactics To Steal Money From Your Bank Account

Hackers Are Using New Tactics To Steal Money From Your Bank AccountNowadays new tactics and techniques have been used by several cybercrime gangs that are common for Advance Persistent Threat (APT)...

View Article

Image may be NSFW.
Clik here to view.

A Trojan To Easily Manipulate Ruble-Dollar Exchange Rate

A Trojan To Easily Manipulate Ruble-Dollar Exchange RateA new Trojan came which can easily manipulate the rubles-dollar exchange rate. In 2015, hackers have already made the use of this Trojan on most...

View Article

Image may be NSFW.
Clik here to view.

JSPrime A Light-Weight Source Code Scanner

JSPrime:A Light-Weight Source Code ScannerIntroductionToday, many developers moved to JavaScript technology because of its simplicity, flexibility and as it is user-friendly. In recent days because of...

View Article


Image may be NSFW.
Clik here to view.

AWS Scout-2: A Security Tool For Accessing AWS Environment (Security Posture)

Image Source: n0where.netAWS Scout-2: A Security Tool For Accessing AWS (Security Posture) AWS Scout2 is an open-source security tool by which assessing of AWS environments security posture becomes...

View Article

Image may be NSFW.
Clik here to view.

Anonymous Hacks South African Government Employees Data Against Child Labor

Anonymous Hacks South African Government Employees Data Against Child Labor.The Hack as behalf of child labor in South Africa. But this breached only decided to leak the data of Government officials,...

View Article

Image may be NSFW.
Clik here to view.

$38 Million Is Needed By FBI To Break The Encryption

$38 Million Is Needed By FBI To Break The Encryption"Whenever we encounter encryption during any of the investigation, that are the hard time for our agents, local as well as state cops too" announced...

View Article


Image may be NSFW.
Clik here to view.

Google's New Security Feature Can Identify Dodgy E-mails

Google's New Security Feature Can Identify Dodgy E-mailsFor boosting security Google added a new feature in Gmail account page. This new feature helps people to identify dodgy emails. It also ensures...

View Article


Image may be NSFW.
Clik here to view.

Swift.nV: A "Secret Keeper" Application For iOS

Swift.nV: A "Secret Keeper" Application For iOS.Swift.nV is a security training tool/application that instructs about how the vulnerabilities found and how we can prevent them. It is an iOS "secret...

View Article

Image may be NSFW.
Clik here to view.

7 Most Sensible Android Tools That Keeps Your Phone Safe

Image Source: computerworld.com7 Most Sensible Android Tools That Keep Safe Your PhoneThere are many people uses Android phone in the world and most of them focus on the security tools like Lookout,...

View Article

Image may be NSFW.
Clik here to view.

BlackEnergy Cyber-Attackers Attacked On Ukraine Railway And Mining Company

BlackEnergy Cyber-Attackers Attacked On Ukraine Railway And Mining CompanyIn December, those BlackEnergy cyber-attackers who had attacked the two power facilities in Ukraine, now recently they have...

View Article

Image may be NSFW.
Clik here to view.

Mimikatz C Learning Tool And Also To Do Experiments With Windows Security

Mimikatz C Learning ToolDefinition: For learning C language we used mimikatz. it is a tool by which we can easily learn C programming language and can also do experiments with Windows security.What can...

View Article


Image may be NSFW.
Clik here to view.

Apple's Being Sued Over A Security Feature That Can Break The iPhone

Apple's Being Sued Over A Security Feature That Can Break The iPhoneDue to the phone-bricking "Error 53" in iPhone, Apple has to face a class action lawsuit, which let some customers to buy the new...

View Article

Image may be NSFW.
Clik here to view.

A 16-Year-Old Has Been Arrested By British Police For Cracking The Personal...

A 16-Year-Old Has Been Arrested By British Police For Cracking The Personal AccountsWASHINGTON: On Friday British Police had arrested the teenager, who was suspected of cracking the personal accounts...

View Article


Image may be NSFW.
Clik here to view.

Fingerping: A Security Tool For Fingerprint PNG Files Of Web Applications

Fingerping: A Security Tool For Fingerprint PNG Files Of Web ApplicationsWhen we audit web applications Fingerprinting is the most important step. The tool which is able to fingerprint the PNG files of...

View Article

Image may be NSFW.
Clik here to view.

Adobe CC 3.5.0.206 Contains A Bug That Deletes Important Data Secretly

Image Source: petapixel.comAdobe Creative Cloud 3.5.0.206 Contains A Bug That Deletes Important Data SecretlyThe latest version of Creative Cloud that is Adobe Creative Cloud version 3.5.0.206. Adobe...

View Article


Image may be NSFW.
Clik here to view.

TDL: A Tool To Bypass Windows x64 Driver Signature Enforcement

TDL (Turla Driver Loader) For Bypassing Windows x64 Signature EnforcementDefinition: TDL Driver loader allows bypassing Windows x64 Driver Signature Enforcement.What are the system requirements and...

View Article

Image may be NSFW.
Clik here to view.

CTF-Tool: A Tool To Create An Installer Of Various Security Research Tools

CTF-Tool: A Tool To Create An Installer Of Various Security Research ToolsDefinition: CTF-tool (a collection of scripts) that can be easily used to create an install of various security research tools....

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals Hacked An E-Commerce Platform To Steal Sensitive Information

Cybercriminals Hacked The Magneto Ecommerce Platform To Steal Sensitive InformationUsing a piece of malware, Cybercriminals hacked the Magneto e-commerce platform to steal sensitive, important and...

View Article
Browsing all 855 articles
Browse latest View live