Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

How To Test Security in IPv4 and IPv6 Data Networks?

How To Test Security in IPv4 and IPv6 Data Networks ?Evil Foca is a tool for security pentesters and auditors whose purpose it is to test security in IPv4 and IPv6 data networks. Compared to IPv4...

View Article


Image may be NSFW.
Clik here to view.

Thug: A Tool For Python Low-Interaction Honeyclient

Thug: A Tool For Python Low-Interaction HoneyclientThug is a Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents.The...

View Article


Image may be NSFW.
Clik here to view.

BLUTO For DNS Recon, Brute Forcer and DNS Zone Transfer

BLUTO is attempting to Brute Force the target domain.Recon, Subdomain Bruting, Zone Transfers.The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The...

View Article

Image may be NSFW.
Clik here to view.

Whonix - Privacy And Anonymity Operating System

Whonix - Privacy And Anonymity Operating SystemWhonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by...

View Article

Image may be NSFW.
Clik here to view.

Your Android Phone is Vulnerable To Remote Hacking With StageFright Bugs

Your Android Phone is Vulnerable To Remote Hacking With StageFright Bugs!Stagefright 2.0, a set of two vulnerabilities that manifest when processing specially crafted MP3 audio or MP4 video files....

View Article


Image may be NSFW.
Clik here to view.

GitHub Announces To Support Universal 2nd Factor Authentication

GitHub Announces To Support Universal 2nd Factor Authentication (U2F) A rapidly growing open authentication standard!When you insert them, these physical USB keys automatically generates a...

View Article

Image may be NSFW.
Clik here to view.

T- Mobiles 15 Million Users Data Gets Hacked

T- Mobiles 15 Million Users Data Gets Hacked!Hackers breached an Experian network it is the World's biggest consumer credit monitoring firm and vendor of the T-mobile company who process the credit...

View Article

Image may be NSFW.
Clik here to view.

US Stock Market Company Scottrade Hacked 4.6 million Customers Are On Risk

US Stock Market Company Scottrade Hacked.4.6 million Customers Are on Risk!Hackers hacked the name and physical address of customers data.Scottrade is a privately owned American discount retail...

View Article


Image may be NSFW.
Clik here to view.

MEMSCAN A Memory Scanning Tool For A Specific Sequence of Bytes

MEMSCAN A Memory Scanning Tool.. For A Specific Sequence of Bytes!A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.To build MEMSCAN, you will...

View Article


Image may be NSFW.
Clik here to view.

YiSpector First iOS Malware That Attacks On Apple iOS Devices

YiSpector: First iOS Malware That Attacks On Apple iOS DevicesYiSpecter is different from previously seen iOS malware in that it attacks both jailbroken and non-jailbroken iOS devices through unique...

View Article

Image may be NSFW.
Clik here to view.

This Female Hacker SexyCyborg Can Break The Security With Her Shoe Heels

This Female Hacker SexyCyborg Can Break The Security With Her Shoe HeelsHer shoes hide the equipment's for hacking into Wi-Fi networks. She can secretly sniff your computers with hidden WiFi testing...

View Article

Image may be NSFW.
Clik here to view.

Former Reuters Journalist Convicted of Helping Anonymous To Hack Los Angeles...

Former Reuters Journalist Convicted of Helping Anonymous To Hack Los Angeles Times Website.Matthew Keys, age 28 from California was found guilty of giving login credentials to the Tribune Co.'s...

View Article

Image may be NSFW.
Clik here to view.

To Be A Part of International Programmer Player Competition And Win upto...

To Be A Part of International Programmer Player Competition (IPPC) And Win upto $500,000Faced with time Programmers and Hackers:Speed & Skill Battle for $500.000We are already convinced that there...

View Article


Image may be NSFW.
Clik here to view.

How Hackers are Using Google AdWords Service to Hack AdWords Users

How Hackers are Using Google AdWords Service to Hack AdWords Users?While searching 'Adwords' related term on Google search engine, I just noticed a mysterious website on the top of the search...

View Article

Image may be NSFW.
Clik here to view.

Twittor A Fully Featured Backdoor That Uses Twitter As Command And Control...

Twittor: A Fully Featured Backdoor That Uses Twitter As Command And Control Server..A stealthy Python based backdoor that uses Twitter (Direct Messages) as a command and control server This project has...

View Article


Image may be NSFW.
Clik here to view.

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate...

"Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (a $35.99 value) Free!"Learn to perform professional penetration testing for high-secured environments with...

View Article

Image may be NSFW.
Clik here to view.

System Administration & Security - Salary & Skills Report

"System Administration & Security - Salary & Skills Report"What you need to know to earn more in system administration and security.Diverse and rapidly changing, network administration and...

View Article


Image may be NSFW.
Clik here to view.

Another Zero Day Vulnerability Found In Adobe Flash

Another "Zero Day" Vulnerability Found In Adobe FlashThe researchers of TrendMicro found Zero day exploit in Adobe Flash Plugin. The Flash zero-day affects at latest version of Adobe Flash Player...

View Article

Image may be NSFW.
Clik here to view.

Web Penetration Testing with Kali Linux Free eBook Valued at $29.99

Web Penetration Testing with Kali Linux (Free eBook Valued at $29.99) Plus 3 Bonus ResourcesThis is the book you need to be fully up-to-speed with this powerful open-source toolkit -- and you're...

View Article

Image may be NSFW.
Clik here to view.

Hackers Can Steal Your Information Through EarPhones

Hackers Can Steal Your Information Through EarPhones..As we are aware about that Google Voice or Siri are tracking us via our mobile devices so that represents a security risks too.French Information...

View Article
Browsing all 855 articles
Browse latest View live