IP Obfuscator is a simple tool written in python to convert an IP into different obfuscated forms. This tool will help you...
Doppelganger is a python script to scan duplicate copies in a given directory. This tool compare not only file names, but also...
w3brute is an open source penetration testing tool that automates attacks directly to the website’s login page. w3brute is also supported for...
The US Department of Justice on Thursday charged two Chinese hackers associated with the Chinese government for hacking numerous companies and government...
The FBI just saved the Christmas. The U.S. Justice Department announced earlier today that the FBI has seized domains of 15 “DDoS-for-hire”...
A security researcher with Twitter alias SandboxEscaper today released proof-of-concept (PoC) exploit for a new zero-day vulnerability affecting Microsoft’s Windows operating system....
Microsoft today issued an out-of-band security update to patch a critical zero-day vulnerability in Internet Explorer (IE) Web browser that attackers are...
Another day, another data breach. This time it’s the United States National Aeronautics and Space Administration (NASA) NASA today confirmed a data...
Security researchers have discovered yet another example of how cybercriminals disguise their malware activities as regular traffic by using legitimate cloud-based services....
Twitter has been hit with a minor data breach incident that the social networking site believes linked to a suspected state-sponsored attack....
Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities. Idea for this script comes from...
celerystalk helps you automate your network scanning/enumeration process with asynchronous jobs (aka tasks) while retaining full control of which tools you want...
Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as...
Shamoon is back… one of the most destructive malware families that caused damage to Saudi Arabia’s largest oil producer in 2012 and...
r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with...
Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet...
Facebook’s latest screw-up — a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of...
A powerful tool for managing networks and troubleshoot network problems! Features Network Interface – Information, Configure IP-Scanner Port-Scanner Ping Traceroute DNS Lookup...
“Pay $20,000 worth of bitcoin, or a bomb will detonate in your building” A massive number of businesses, schools, government offices and...
One Security vulnerability assessment/management tool to solve all the security team problems. What is Jackhammer? Jackhammer is a collaboration tool built with...
Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for...