portSpider - A Lightning Fast Multithreaded Network Scanner Framework With...
A lightning fast multithreaded network scanner framework with modules.modules:http - Scan for open HTTP ports, and get the the titles.mysql - Scan for open MySQL servers, and try to log in with the...
View ArticleBruteSploit - Bruteforce And Manipulation Wordlist
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and can be used in CTF...
View ArticleTails 3.0 - The Amnesic Incognito Live System
New featuresNEW STARTUP AND SHUTDOWN EXPERIENCETails Greeter, the application to configure Tails at startup, has been completely redesigned for ease of use:All options are available from a single...
View ArticleRED HAWK - All In One Tool
RED HAWK is An All In One Tool For Information Gathering, SQL Vulnerability Scannig and Crawling.Coded In PHPFeatures Of The Tool:Server detectionCloudflare detectorrobots scannerCMS...
View ArticleViper-shell : Testing exploitation and enumeration
Viper is designed in order to retrieve compromised files, processes, and services in case you have to reach out and grab information quickly. The viper can also be used for testing exploitation and...
View ArticleLFISuite – Totally Automatic LFI Exploiter, ReverseShell and Scanner
Disclaimer: Author not responsible for any kind of illegal acts you cause. This is meant to be used for ethical purposes by penetration testers. If you plan to copy, redistribute please give credits to...
View ArticleEuropol arrest 6 over malware crypter and counter anti-virus platform
Authorities have conducted a large-scale operation against cyber criminals in several European countries. As a result, 6 people have been arrested while 36 have been questioned after Europol, Germany’s...
View ArticleMeet Sophia, the Humanoid Robot
Hanson Robotics showed off its life-like robot Sophia today in Hong Kong as it answered questions, cracked jokes, and proved that it no longer wishes to see the destruction of all humankind.In March at...
View ArticleCherry Blossom: #WikiLeaks’ Latest Dump Exposes #CIA Wireless Hacking Tools
The whistleblowing site WikiLeaks is back with yet another Vault 7 series related document. This one is called “Cherry Blossom” program which gives a glance at the wireless hacking capabilities of The...
View ArticlePentestly Framework: When Pentesting Meets Python and Powershell
Python appears to be an ever growing trend in the security community. Being able to connect Python tools together has proven beneficial for us. Powershell has also seen increasingly more use due to its...
View ArticleSigPloit - Telecom Signaling Exploitation Framework
SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators...
View ArticleAVET - AntiVirus Evasion Tool
AVET is an AntiVirus Evasion Tool, which was developed for making life easier for pentesters and for experimenting with antivirus evasion techniques. In version 1.1 lot of stuff was introduced, for a...
View ArticleDroid Hunter - Android application vulnerability analysis and Android pentest...
SupportApp info checkBaksmaling android appDecompile android appExtract class fileExtract java codePattern base Information LeakageHow to Install?A. Download(clone) & Unpack DROID-HUNTERgit clone...
View ArticleThe First In-Screen Fingerprint Reader is Coming, But Not from Apple or Samsung
For months, consumers have been itching to know whether it will be Samsung or Apple that has the first in-screen fingerprint scanner in their next smartphone. Now, reputable researcher Jiutang Pan has...
View ArticleFiercePhish - full-fledged phishing framework
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will...
View ArticleWeb Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back
South Korean web hosting provider has agreed to pay $1 million in bitcoins to hackers after a Linux ransomware infected its 153 servers, encrypting 3,400 business websites and their data, hosted on...
View ArticleCATPHISH - For Phishing And Corporate Espionage
Project for phishing and corporate espionage.Current AlgorithmsSingularOrPluraliseprependOrAppenddoubleExtensionsmirrorizationhomoglyphsdashOmissionPunycodeCATPHISH v.0.0.5Added more languages....
View ArticleProtonMail provider launches ProtonVPN
You can now directly get ProtonVPN by visiting https://protonvpn.com“In the past year, we have seen more and more challenges against Internet freedom,” says ProtonMail Co-Founder Dr. Andy Yen, “now...
View ArticleRedhawkSDR - a software-defined radio (SDR) framework #NSA
REDHAWK is a software-defined radio (SDR) framework designed to support the development, deployment, and management of real-time software radio applications. To support the design and development of...
View ArticleICS SCADA NSA Situational Awareness: Grassmarlin #NSA
Provide IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Passively map, and visually...
View Article