Quantcast
Channel: Hackers Online Club (HOC)
Browsing all 855 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

PyAna - Analyzing the Windows shellcode..

PyAna - Analyzing the Windows shellcode..Using Unicorn Framework for emulating shellcode. PyAna emulate a process on Windows: PEB, TIB, LDR_MODULE to create a emulative environment.UsageFrom...

View Article


Image may be NSFW.
Clik here to view.

Snowden Says, FBI Can't Arrest A Robot at CES 2016

Snowden Says, FBI Can't Arrest A Robot at CES 2016Snowden's high tech gadget surprises audience who were attending Consumer Electronics Show (CES) featuring at Las Vegas.While appearing on a...

View Article


Image may be NSFW.
Clik here to view.

Zero-Day Danger: A Survey of Zero-Day Attacks and What They Say

Zero-Day Danger: A Survey of Zero-Day Attacks and What They SayZero-day attacks are targeting software vulnerabilities, and this white paper will provide an overview of many of those attacks in the...

View Article

Image may be NSFW.
Clik here to view.

Introducing New More Anonymity Tool Called PrivaTegrity

Introducing New Anonymity Tool Called "PrivaTegrity".PrivaTegrity would resolve the issues of TOR, can say alternative of TOR.The Father of Online Anonymity "David Lee Chaum" (born 1955) who is the...

View Article

Image may be NSFW.
Clik here to view.

Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM...

Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM AttacksOver the last few years we have seen so many crimes regarding the ATM attacks using malicious malware or through any...

View Article


Image may be NSFW.
Clik here to view.

Black Hat SEO Campaign: Akamai’s New Campaign Powered By SQL Injection To...

Black Hat SEO Campaign: Akamai’s New Campaign Powered By SQL Injection To Boost Search Rankings.In the middle of the 2015, According to report Akamai identified a sophisticated Black Hat Search Engine...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Officially Ends Support For Internet Explorer’s Older Versions 8, 9...

Microsoft Officially Ends Support For Internet Explorer’s Older Versions 8, 9 and 10.As of from Tuesday Microsoft has officially ended support for Internet Explorer version 8, 9 and 10, leaving only...

View Article

Image may be NSFW.
Clik here to view.

Yahoo Lawsuits: Finally Yahoo Agrees To Settle E-mail Privacy Suit

Yahoo Lawsuits: Finally Yahoo Agrees To Settle E-mail Privacy Suit.At last Yahoo Inc. has agreed to settle a class action challenging the way the company analyzes email messages to serve targeted ads...

View Article


Image may be NSFW.
Clik here to view.

Ransomware: A Badly-Coded New Malware That Can Destroy Your Files

Ransomware: A Badly-Coded New Malware That Can Destroy Your FilesA malware that restricts the users to access the infected computer system and demands some amount of ransom that is paid by the user to...

View Article


Image may be NSFW.
Clik here to view.

Android Bankosy: A Malware That Uses Call Forwarding To Intercept Voice Calls

Android Bankosy: A Malware That Uses Call Forwarding To Intercept Voice CallsOnline theft has been increased tremendously in the world. Somewhere it’s related to e-mail, social networking account,...

View Article

Image may be NSFW.
Clik here to view.

Silverlight Zero-Day Exploit: Hacking Team Breach Helps Kaspersky Lab

Silverlight Zero-Day Exploit: Hacking Team Breach Helps Kaspersky LabZERO-DAY EXPLOIT: It’s an unknown flaw/exploit that exposes a vulnerability in software or hardware and able to create complicated...

View Article

Image may be NSFW.
Clik here to view.

Ring Video Doorbell: Pen Test Partners Found A Serious Flaw For Hackers

Ring Video Doorbell: Pen Test Partners Found A Serious Flaw For HackersAccording to PTP team of testers Ring has already addressed the issue via a firmware update, but it's still interesting to look at...

View Article

Image may be NSFW.
Clik here to view.

Inexpensive Webcams Easily Turned Into A Network Backdoor

Inexpensive Webcams Easily Turned Into A Network BackdoorAccording to the researchers, we can easily turn webcam connected device into a backdoor. A ‘tiny' D-Link web camera and turned it into a...

View Article


Image may be NSFW.
Clik here to view.

WS-Attacker A Modular Framework For Web Services Penetration Testing

WS-Attacker is a modular framework for web services penetration testing.It is developed by the Chair of Network and Data Security, Ruhr University Bochum (http://nds.rub.de/ ) and the 3curity GmbH...

View Article

Image may be NSFW.
Clik here to view.

A Bug That Can Leak Private Cryptographic Keys Has Been Fixed In OpenSSH

A Bug That Can Leak Private Cryptographic Keys Has Been Fixed In OpenSSHOpenSSH is the widely used implementations of the SSH(Secure Shell) protocol and a bug was there which possess the ability to...

View Article


Image may be NSFW.
Clik here to view.

MegalodonHTTP: Suspect Of The DDos Malware Arrested

MegalodonHTTP: Suspect Of The DDos Malware ArrestedMegalodonHTTP, is a malware that includes a back door for administrative control over the target computer and designed to power distributed...

View Article

Image may be NSFW.
Clik here to view.

BugshotKit: iOS in-app Bug For Developers And Testers

BugshotKit: iOS in-app Bug For Developers And TestersMarco Arment, made this app for developers to annotate screenshots. And he released an open-source embeddable version for iOS developers. It is made...

View Article


Image may be NSFW.
Clik here to view.

Cisco Kills Hardcoded Password In Software Devices

Cisco Kills Hardcoded Password In Software DevicesWi-Fi gear, WLAN controllers, and ISE.Cisco are the wireless devices designed by Cisco with hardcoded passwords. Recently two critical vulnerabilities...

View Article

Image may be NSFW.
Clik here to view.

SQLmap: A Open-Source Penetration Testing Tool

SQLmap: A Open-Source Penetration Testing ToolDefination: An open source penetration testing tool that perform the process of detecting and exploiting SQL injection flaws and taking over of database...

View Article

Image may be NSFW.
Clik here to view.

Mac Malware: Researchers Found A Way To Patch Malware

Mac Malware: Researchers Found A Way To Patch Malware.Apple’s OS X has a built-in anti-malware Gatekeeper system whose purpose is to protect Macs from cyber attacks from all over the world. In...

View Article
Browsing all 855 articles
Browse latest View live