CuckooDroid - Automated Android Malware Analysis Tool
CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid...
View ArticlePompem - Exploit and Vulnerability Finder Pentester Tool
Pompem - Exploit and Vulnerability Finder Pentester ToolPompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases. Its's Developed in...
View ArticleWindows 10 Bible (FREE eBook!) A $32.99 Value
Windows 10 Bible (FREE eBook!) A $32.99 ValueA complete, detailed Windows 10 reference for beginners and power users alike.Windows 10 Bible is one of the most thorough references on the market with...
View ArticleOWASP Mth3l3m3nt Framework: A Penetration Testing Aiding And Exploitation...
OWASP Mth3l3m3nt Framework: A Penetration Testing Aiding Tool And Exploitation FrameworkIt fosters a principle of attack the web using the web as well as pentest.Modules Packed in so far are:Payload...
View ArticleMail.ru Forums Hacked Over 25 Million Users Accounts Gets Compromised
Mail.ru Forums Hacked Over 25 Million Users Accounts Gets Compromised.Russian Internet company communities cfire.mail.ru (Cross Fire game), parapa.mail.ru (ParaPa Dance City game), and tanks.mail.ru...
View ArticleHackers Group Attack On Official Website of Israel Prime Minister and Bank Of...
Cyber Attack On Official Website of Israel Prime Minister and Bank Of IsraelGhost Squad Hackers Group Takes Down Bank of Israel and Prime Minister of Israel official website using DOS attack.One of the...
View ArticleHow This Trick Can Hijack Your Chrome Browsers
How This Trick Can Hijack Your Chrome Browsers.Tech support scammers using Social engineering technique and show fake Google UI Toolbar in the form of JPEG.Malware bytes Labs discovers that, the Fake...
View ArticleHack QR Code Through QRLJacking Attack
Hack QR Code Through QRLJacking AttackQRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on...
View ArticleFacebook And Twitter Accounts Can Hack Through target="_blank" Vulnerability
Facebook And Twitter Accounts Can Hack Through target="_blank" Vulnerability.The target="_blank" is using for target attribute specifies where to open the link in new tab. Hackers are using this trick...
View ArticleBetabot Trojan Steals Your Passwords And Install Ransomware To Monetize
Betabot Trojan Steals Your Passwords And Install Ransomware To Monetize.Betabot was delivered by Neutrino Exploit Kit. The IP used for both Betabot and Cerber is 93[.]174.91.49. A virustotal report on...
View ArticleLuaBot First Botnet Malware To Target Linux Platforms
View the binary's ASCII in the last part and you'll see the first email address | Credit: MalwareMustDie Researchers Finds LUA Language ELF Compiled Malware Called As Linux/LuaBot.Trojan coded in Lua...
View ArticleFREE DDoS Handbook: The Ultimate Guide to Everything You Need to Know About...
DDoS Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.DDoS attacks are the most persistent and damaging cyber-attacks. They reflect hackers' frustratingly high levels of...
View ArticleWireshark 2.2.0 Announced With New Features And Bug Fixes
Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development.It formely known as Ethereal, Wireshark allows...
View ArticleCryLocker Ransomware Gather Victim Wi-Fi Network Information And Location On...
CryLocker Ransomware Gather Victim Wi-Fi Network Information And Location On Google Map.Over 10,000 Users Infected from CryLocker Ransomware. Files extension changes to *.CRY. Detected By TrendMicro...
View ArticleWADA Confirms They Got Hacked By Russian Hackers Group Fancy Bear
WADA Confirms They Got Hacked By Russian Hackers Group Fancy Bear.World Anti Doping Agency (WADA) Got Hacked.US Athletes Database Files Leaked online.Hackers Group Claim to be a part of...
View ArticleSecurity Researcher Found Facebook Vulnerability To Hack Any Facebook Page
Indian Security Researcher Arun Sureshkumar Found Facebook Vulnerability To Hack Any Facebook Page. He described the proof of concept of vulnerability in its blogIt was the critical vulnerability,...
View ArticleTesla Model S Gets Hacked By Security Researchers
Tesla Model S Gets Hacked By Security Researchers.Tesla Model S Gets Hacked!Chinese Security Experts of Keen Security Lab demonstrate in video. Keen Security Lab is coordinating with Tesla on issue...
View ArticleMassive Data Breach Over 200 Million Users Yahoo Account: Report
Massive Data Breach on Yahoo! Service : reportHackers breached Yahoo Servers.200 Million Users account Exposed.Yahoo is reportedly expected to confirm with an official statement.According to Recode,The...
View ArticleYahoo Officially Confirms 500 Million User Accounts Got Hacked
Today, Yahoo officially said, that 500 Million User Account Got Hacked.As we reported yesterday about Yahoo is set to be confirmed Massive data breach.According to chief information security officer...
View ArticleA Simple Static Malware Analyzer SSMA Tool Written in Python 3
SSMA is a simple malware analyzer written in Python 3. Features: Analyze PE file’s header and sections (number of sections, entropy of sections/PE file, suspicious section names, suspicious flags in...
View Article