This small script will simulate fake processes of analysis, sandbox and/or VM software that some malware will try to avoid. You can...
A CMS Exploit Framework. Requirements python2.7 Works on Linux, Windows Usage usage: cmspoc.py [-h] -t TYPE -s SCRIPT -u URL optional arguments:...
Adobe’s latest security update has swatted a total of 67 bugs, some of them critical, in Adobe Flash, Acrobat, and Reader. On...
Forever 21 is investigating a potential data breach which may have compromised customer information and payment cards. On Tuesday, the US clothing...
The federal government on Tuesday issued an alert detailing the North Korean government’s use of malware known as FALLCHILL, warning that North...
Newly uncovered vulnerabilities in a popular brand of indoor internet-connected cameras could be exploited by attackers in order to gain complete control...
OONI, the Open Observatory of Network Interference, is a global observation network which aims is to collect high quality data using open...
Nishang is an open source framework and collection of powerful PowerShell scripts and payloads that you can use during penetration testing audit,...
Mail header analyzer is a tool written in flask for parsing email headers and converting them to a human readable format and...
The Firefox sandboxing innovation confines the browser from the operating system in a way to block web attacks from using a vulnerability...
Similar to questionable stingray devices, DRT’s operations nicknamed “dirt boxes” mimic cellphone pillars, relating to every smartphone within a specific area. Because...
Just over a month after OnePlus was caught collecting personally identifiable information on its users, the Chinese smartphone company has been found...
Faraday is the Integrated Multiuser Risk Environment you have always been looking for! It maps and leverages all the data you generate in real time,...
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full...
Apple uses the Tenth Anniversary iPhone X Phone to replace Touch ID. Because the award handset features an edge-to-edge protection and has...
Bitcoin surged on Monday, recovering more than $1,000 after losing almost a third of its value in less than four days as...
This tool is designed to manipulate FAT filesystems, in order to explore, extract, repair, recover and forensic them. It currently supports FAT12,...
News of the event was posted on Twitter by vigilante hacker, “The Jester,” who has in the past increased fame by hacking...
Blockchain.info is a bitcoin cryptocurrency wallet and block explorer service. Started in August 2011, the service presents information on new transactions, mined...
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis. Also, the inspiration for another Android deobfuscator: Simplify. Before...
The tool itself is impressive enough, serving as the backbone of the CIA’s malware processes, but there’s more. What’s interesting about the...