How To Test Security in IPv4 and IPv6 Data Networks?
How To Test Security in IPv4 and IPv6 Data Networks ?Evil Foca is a tool for security pentesters and auditors whose purpose it is to test security in IPv4 and IPv6 data networks. Compared to IPv4...
View ArticleThug: A Tool For Python Low-Interaction Honeyclient
Thug: A Tool For Python Low-Interaction HoneyclientThug is a Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents.The...
View ArticleBLUTO For DNS Recon, Brute Forcer and DNS Zone Transfer
BLUTO is attempting to Brute Force the target domain.Recon, Subdomain Bruting, Zone Transfers.The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The...
View ArticleWhonix - Privacy And Anonymity Operating System
Whonix - Privacy And Anonymity Operating SystemWhonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by...
View ArticleYour Android Phone is Vulnerable To Remote Hacking With StageFright Bugs
Your Android Phone is Vulnerable To Remote Hacking With StageFright Bugs!Stagefright 2.0, a set of two vulnerabilities that manifest when processing specially crafted MP3 audio or MP4 video files....
View ArticleGitHub Announces To Support Universal 2nd Factor Authentication
GitHub Announces To Support Universal 2nd Factor Authentication (U2F)Â A rapidly growing open authentication standard!When you insert them, these physical USB keys automatically generates a...
View ArticleT- Mobiles 15 Million Users Data Gets Hacked
T- Mobiles 15 Million Users Data Gets Hacked!Hackers breached an Experian network it is the World's biggest consumer credit monitoring firm and vendor of the T-mobile company who process the credit...
View ArticleUS Stock Market Company Scottrade Hacked 4.6 million Customers Are On Risk
US Stock Market Company Scottrade Hacked.4.6 million Customers Are on Risk!Hackers hacked the name and physical address of customers data.Scottrade is a privately owned American discount retail...
View ArticleMEMSCAN A Memory Scanning Tool For A Specific Sequence of Bytes
MEMSCAN A Memory Scanning Tool.. For A Specific Sequence of Bytes!A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.To build MEMSCAN, you will...
View ArticleYiSpector First iOS Malware That Attacks On Apple iOS Devices
YiSpector: First iOS Malware That Attacks On Apple iOS DevicesYiSpecter is different from previously seen iOS malware in that it attacks both jailbroken and non-jailbroken iOS devices through unique...
View ArticleThis Female Hacker SexyCyborg Can Break The Security With Her Shoe Heels
This Female Hacker SexyCyborg Can Break The Security With Her Shoe HeelsHer shoes hide the equipment's for hacking into Wi-Fi networks. She can secretly sniff your computers with hidden WiFi testing...
View ArticleFormer Reuters Journalist Convicted of Helping Anonymous To Hack Los Angeles...
Former Reuters Journalist Convicted of Helping Anonymous To Hack Los Angeles Times Website.Matthew Keys, age 28 from California was found guilty of giving login credentials to the Tribune Co.'s...
View ArticleTo Be A Part of International Programmer Player Competition And Win upto...
To Be A Part of International Programmer Player Competition (IPPC) And Win upto $500,000Faced with time Programmers and Hackers:Speed & Skill Battle for $500.000We are already convinced that there...
View ArticleHow Hackers are Using Google AdWords Service to Hack AdWords Users
How Hackers are Using Google AdWords Service to Hack AdWords Users?While searching 'Adwords' related term on Google search engine, I just noticed a mysterious website on the top of the search...
View ArticleTwittor A Fully Featured Backdoor That Uses Twitter As Command And Control...
Twittor: A Fully Featured Backdoor That Uses Twitter As Command And Control Server..A stealthy Python based backdoor that uses Twitter (Direct Messages) as a command and control server This project has...
View ArticleAdvanced Penetration Testing for Highly-Secured Environments: The Ultimate...
"Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (a $35.99 value) Free!"Learn to perform professional penetration testing for high-secured environments with...
View ArticleSystem Administration & Security - Salary & Skills Report
"System Administration & Security - Salary & Skills Report"What you need to know to earn more in system administration and security.Diverse and rapidly changing, network administration and...
View ArticleAnother Zero Day Vulnerability Found In Adobe Flash
Another "Zero Day" Vulnerability Found In Adobe FlashThe researchers of TrendMicro found Zero day exploit in Adobe Flash Plugin. The Flash zero-day affects at latest version of Adobe Flash Player...
View ArticleWeb Penetration Testing with Kali Linux Free eBook Valued at $29.99
Web Penetration Testing with Kali Linux (Free eBook Valued at $29.99) Plus 3 Bonus ResourcesThis is the book you need to be fully up-to-speed with this powerful open-source toolkit -- and you're...
View ArticleHackers Can Steal Your Information Through EarPhones
Hackers Can Steal Your Information Through EarPhones..As we are aware about that Google Voice or Siri are tracking us via our mobile devices so that represents a security risks too.French Information...
View Article