British Teen Admits Attempt To Hack Into CIA Chief's Computer
British Teen Admits Attempt To Hack Into CIA Chief's Computer18 year old Kane Gamble has admitted trying to hack computers of senior US government officials at Leicestershire Crown court.He...
View ArticleSQLiv Massive SQL Injection Vulnerability Scanner
(SQLiv) Massive SQL Injection Vulnerability ScannerFeaturesMultiple domain scanning with SQL injection dork by Bing, Google, or YahooTargetted scanning by providing specific domain (with...
View ArticleCoding For Dummies ($16 Value) FREE For A Limited Time
Coding For Dummies ($16 Value) FREE For a Limited TimeThese hands-on exercises will help you learn to code like a pro.No coding experience is required for Coding For Dummies, your one-stop guide to...
View Articlepsad - Port Scan Attack Detector And Intrusion Detection With IpTables Logs
psad - Intrusion Detection with iptables LogsIntroductionThe Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld...
View ArticleKRACK : Key Re-installation Attacks To Hack Secured Wi-Fi
KRACK : Key Re-installation Attacks To Hack Secured Wi-FiAccording to Security Researcher Mathy Vanhoef, he has discovered serious weaknesses in WPA2.A protocol that secures all modern protected Wi-Fi...
View ArticleCyberScan An Open Source Penetration Testing Tool For Scanning Ports, Pinging...
CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country.Operating...
View ArticleGoogle Offers Big Rewards To Hack Android's Most Popular Apps
Google Offers Big Rewards To Hack Android's Most Popular AppsGoogle is looking to improve its Play Store security. Google calls security researchers who invest their time and effort in order to make...
View ArticleReflector: The Burp Plugin To Find Reflected XSS in Real Time
Reflector: The Burp Plugin To Find Reflected XSS in Real TimeBurp Suite extension is able to find reflected XSS on page in real-time while browsing on web-site and include some features as:Highlighting...
View ArticleKRACK Detector: To Detect And Prevent KRACK Attacks in Your Network
KRACK Detector: To Detect And Prevent KRACK Attacks in Your NetworkKRACK Detector To Detect Possible KRACK Attacks Against Client Devices On Your Network.What is KRACK Attack?A protocol that secures...
View ArticleWPSeku – Black-Box Remote WordPress Security Scanner
WPSeku – Black-Box Remote WordPress Security ScannerWPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.Installation#...
View ArticleWikileaks Releases HIVE Source Code Under New Vault 8 Series Which Controls...
Wikileaks Releases HIVE Source Code Under New Vault 8 Series Which Controls Malware System of CIAWikiLeaks publishes the source code and development logs to Hive, a major component of the CIA...
View ArticleWhat Is A VPN And Why is it So Important To Protect Your Privacy?
What Is A VPN And Why is it So Important To Protect Your Privacy?A Virtual Private Network (VPN) is a technology that improves your privacy and online security by a large scale. Whenever use a VPN, you...
View ArticleTrape - People Tracker On The Internet: Learn to Track The World To Avoid...
Trape - People Tracker On The Internet: Learn to Track The World To Avoid Being TracedTrape is a recognition tool that allows you to track people, the information you can get is very detailed. We want...
View ArticleFlight Boeing 757 Was Remotely Hacked Without Knowledge of Pilots
Flight Boeing 757 Was Remotely Hacked Without Knowledge of Pilots.OMG! This is the BIG Airplanes Also Been Hacked, Shocked but its True.The Homeland Security Team remotely hacked Boeing 757.DHS...
View ArticleUC Browser Removed From Google Play Store Due To Break Google Policy
Google Removed UC Browser from its Play Store for Breaking Google PoliciesUC Browser is a well known Alibaba owned company.According to report, UC Browser was under government surveillance in August...
View ArticlePuffs: Parsing Untrusted File Formats Safely
Puffs: Parsing Untrusted File Formats SafelyPuffs is a domain-specific language and library for parsing untrusted file formats safely. Examples of such file formats include images, audio, video, fonts...
View ArticleBlackArch Linux Removed Support For 32Bit Machine Available Only for 64Bit OS
BlackArch Linux Removed Support For 32Bit Machine Available Only for 64Bit OSBlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers....
View ArticleMacX MediaTrans V4.9 - To Backup And Transfer Data Between iOS Devices and...
MacX MediaTrans V4.9 - An iTunes Alternative for Mac (Valued at $59.95) FREE for a Limited TimeMacX MediaTrans is an ultimate iPhone iPad manager for Mac users to backup and transfer data between iOS...
View ArticleNew Banking Malware Spreads in Flashlight and Solitaire Apps
New Banking Malware Spreads in Flashlight and Solitaire AppsBankBot, a new Banking Malware found by cybersecurity researchers. Discovered by the joint operation of security researchers at Avast, ESET...
View ArticleIP-Biter: The Hacker-Friendly E-Mail Tracking Framework
IP-Biter - The Hacker-Friendly Tracking FrameworkIP-Biter is an open source, easy to deploy, tracking framework that generate high configurables and unique tracking images and links to embed in...
View Article