Rollmac (Credits: violentshell) Free networks often impose either a time or data restriction and this can be used quickly. When this happens...
Welcome back today we will be talking about Remote Access of machines running on Linux Operating Systems. Why would someone want to...
Hot topics now trending is the leak of thousands of documents from CIA’s vault 7 series of documents, these leaks are continuously exposing...
Trending website WikiLeaks today April 7th, 2017, released new 27 documents of vault 7 series of leaked documents, which belonged to US...
Welcome back today we will talk about Injecting some malicious XSS code into a Image. We will be using Kali Linux for...
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns. [Live Project – Python3.6] https://github.com/v3n0m-Scanner/V3n0M-Scanner V3n0M is a free and open source...
Exploits and Security Tools Framework 2.0.0 (Credits C0reL0ader) http://eastfw.com/ «EAST» – «Exploits And Security Tools» penetration testing framework. Overview Pentest framework environment...
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of...
The SySS Radio Hack Box is a proof-of-concept software tool to demonstrate the replay and keystroke injection vulnerabilities of the wireless keyboard...
SQL Inject Me is a Firefox addon created by Security Compass it is used for finding SQL vulnerabilities in Web applications. SQL...
Browser Extension shows how Facebook handles and tracks your data using machine learning alogorithms. We recently came across this really cool browser...
The Arch Linux based distro that runs upon any Linux distros without root access. JuNest (Jailed User NEST) is a lightweight Arch...
WAFNinja is a tool which contains two functions to attack Web Application Firewalls. WAFNinja - Penetration testers favorite for WAF Bypassing WAFNinja...
Today Researchers have been finding a way to make Robots and Artificial intelligence part of our daily life. Artificial intelligent again is...
Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for combining the management of devices and applications in a network...
Interested in collecting evidence of Internet censorship? Curious about the speed and performance of the network that you are using? By running...
The Botdr4g0n is a security tool for DDOS attack on SSH BOT management for distributed attacks. How to Install python 2.7 git...
DevKnox is a first of its kind security tool that enables developers to detect and resolve security issues as they write code...
RCE_FINDER How to use root@kali:/rce_finder # python scan_rce.py # LOGO ########################################## #| By Rudra Sarkar - @rudr4_sarkar # #| Loaded Modules :...
Clickbait Detector Detects clickbait headlines using deep learning. If you like this software please consider leaving the author a star on github....
A python based backdoor which uses Telegram as C&C server. Setup Telegram setup: Install Telegram app and search for “BOTFATHER”. Type /help...