After rapidly reinforcing a flaw that acknowledged anyone with access to a High Sierra Mac to take administrative control, Apple still has...
The group, called Google You Owe Us, said in a declaration Thursday that it was the first case of its sort in...
Amber is a proof of concept packer, it can pack regularly compiled PE files into reflective PE files that can be used...
This tool is intended for Penetration Testers who audit WordPress plugins or developers who wish to audit their own WordPress plugins. For...
Automated script to search in SMB protocol for availables pipe names. Requirements metasploit-framework wget pipe_audit_v2.rb module (https://github.com/peterpt/pipe_auditor_fb) – It will be installed...
An Easy and Simple Anti-DDoS solution for VPS,Dedicated Servers and IoT devices based on iptables. Requirements Linux System with python, iptables Nginx...
sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the...
Google has explicitly rejected them from the Play Store. Identify Airpush? The current advertisement scourge is ad-infused lock screens, which have shown up...
The cryptocurrency fell as greatly as 8 percent on Thursday on the Luxembourg confirmed Bitstamp exchange to hit $9,000 exactly, considering a...
Zeus is an advanced reconnaissance utility designed to make web application reconnaissance simple. Zeus comes complete with a powerful built-in URL parsing...
Advanced Telegram Desktop Session Hijacker! Stealing desktop telegrams has never been so easy ! Set the email and sender details of the...
A proof-of-concept tool for generating payloads that exploit unsafe .NET object deserialization. Description ysoserial.net is a collection of utilities and property-oriented programming...
An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills. Check out the example (digraph), which...
Web Privacy Measurement is the observation of websites and serves to detect, characterize and quantify privacy-impacting behaviors. Applications of Web Privacy Measurement...
What this tool does is taking a file (any type of file), encrypt it, and embed it into an HTML file as...
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and...
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim’s machine, a controler, running on any machine,...
Written by Amit Serper, @0xAmit DDEtector is a simple DDE object detector written in python Currently supports only word DOCX and legacy...
IP-Biter is an open source, easy to deploy, tracking framework that generate high configurables and uniques tracking images and links to embed...
PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly...
A former operations manager existed for Facebook’s privacy works said the company “prioritized data gathering from its users overprotecting them from abuse.”...