Hackers can steal your windows credentials using Google Chrome
A security researcher has discovered a serious vulnerability in the default configuration of the latest version of Google's Chrome running on any version of Microsoft's Windows operating system,...
View ArticleTrity - advanced pentesting framework
Trity is an advanced pentesting framework dedicated to everything from cryptography to spoofing.Installation & UsageIn order to install this program, it is crucial that you are on a Linux-based...
View ArticleJaff Ransomware Distributed via Necurs MALSPAM and asking for a $3,700 Ransom
A new ransomware was found today by Malwarebytes' malware researcher S!Ri called Jaff Ransomware. In general, there is nothing special about this ransomware other than it is being heavily distributed...
View ArticleNew SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
Researchers have detected a new worm that is spreading via SMB, but unlike the worm component of the WannaCry ransomware, this one is using seven NSA tools instead of two.The worm's existence first...
View ArticleOur Free Proxy List Service is Open now
Always fresh proxy service (http proxy, ssl proxy, socks4 proxy and socks5 proxy) that you can use for FREELINK:Â http://free-proxy-list.hack4.net/
View ArticleOWASP Mobile Security Testing Guide
IntroductionHeaderForewordFrontispieceOverviewIntroduction to the Mobile Security Testing GuideTesting Processes and TechniquesAndroid Testing GuidePlatform OverviewAndroid Security Testing...
View ArticleWanaKiwi - Automated wanadecrypt with key recovery if lucky
This utility allows machines infected by the WannaCry ransomware to recover their files.wanakiwi is based on wanadecrypt which makes possible for lucky users to :Recover the private user key in memory...
View ArticleReconnoitre - Automate information gathering and Service enumeration
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results along with writing out recommendations for further testing.This...
View ArticleTweetsDelete - mass delete tweets tool
TweetsDelete is a small application to delete your old, unpopular tweets.SetupCreate a new Twitter app at https://apps.twitter.com/Get the API key and secret of the app, and assign it to API_KEY and...
View ArticleCameradar - An RTSP Surveillance Camera Access Multitool
Cameradar hacks its way into RTSP CCTV camerasCameradar allows you to:Detect open RTSP hosts on any accessible targetGet their public info (hostname, port, camera model, etc.)Launch automated...
View ArticleXSS'OR - Hack with JavaScript
XSS'OR is a free online tool for hacking with JavaScript.It contains three major modules:1. Encode/DecodeThe Encode/Decode module, including:front-end encryption and decryption;code compression,...
View ArticleWhitewidow - SQL Vulnerability Scanner
Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file...
View ArticleDagon - Advanced Hash Manipulation
Named after the prince of Hell, Dagon (day-gone) is an advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing...
View ArticleCangibrina - Admin Finder
Cangibrina is a multi platform tool which aims to obtain the Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txtRequirements:Python...
View ArticlePybelt - Hacker Tools
Pybelt is an open source hackers tool belt complete with:A port scannerSQL injection scannerDork checkerHash crackerHash type verification toolProxy finding toolXSS scannerIt is capable of cracking...
View ArticleSamba Remote Code Execution
CVE : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494The seven-year-old exploit, indexed as CVE-2017-7494, are often reliably exploited with only 1 line of code to execute malicious code,...
View ArticleNSEARCH - Nmap Scripting Engine Search
Nsearch, is a tool that helps you to find scripts that are used by nmap ( nse ) , you can search the scripts using differents keyword as the name, category and author, even using all the keyword in a...
View ArticleAndrol4b - Android Security VM
AndroL4b is an android security virtual machine based on ubuntu-mate includes the collection of latest framework, tutorials and labs from different security geeks and researchers for reverse...
View ArticlePhishingKitHunter - Find Phishing Kits Which Use Your Brand/Organization'S...
Find phishing kits which use your brand/organization's files and image.PhishingKitHunter (or PKHunter) is a tool made for identifying phishing kits URLs used in phishing campains targeting your...
View ArticleQuickSand.io - Tool For Scanning Streams Within Office Documents Plus Xor DB...
File Formats For Exploit and Active Content Detectiondoc, docx, docm, rtf, etcppt, pptx, pps, ppsx, etcxls, xlsx, etcmime msoeml emailFile Formats For Executable DetectionAll of the above, plus PDF.Any...
View Article