Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to...
A rogue Twitter employee deactivated President Trump’s personal Twitter account (@realdonaldtrump) on his last day as a customer support rep for the...
Apple’s privacy signs do not spread to the thousands of app developers who will gain access to facial data in order to...
Cybercriminals decided to use the Search Engine Optimization (SEO) to make their malicious links more widespread in the search results, allowing them...
This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default...
Protect your parents from phishing, HTTP proxy focused on block phishing URL’s Install git clone https://github.com/mthbernardes/HouseProxy.git cd HouseProxy/ pip install -r requeriments.txt...
In 2013, Hackers apparently gained access to the Trump Organization’s domain booking account and created at least 250 website subdomains that cybersecurity...
The CryptoShuffler malware has been discovered by security researchers from Kaspersky Lab, cybercriminals are using this malware to steal cryptocurrencies from the...
nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and...
The cryptocurrency has had a bullish streak completely the week following the CME’s statement that it will introduce bitcoin expectations contracts. According to data...
As we’ve seen, that’s been shifting. With a new game from companies like Hulu and Amazon, Netflix has seen running deals get...
Phishruffus is a tool designed to identify threats and malicious DNS servers on the Internet that are used for the illicit practice...
Critically, both OS updates address the KRACK Wi-Fi vulnerability for any devices. It is a dangerous vulnerability in the WPA2 Wi-Fi assurance standard that allowed hostile...
Diamorphine is a LKM rootkit for Linux Kernels 2.6.x/3.x/4.x Features When loaded, the module starts invisible; Hide/unhide any process by sending a...
TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: Secure Shell...
A new Facebook spam campaign has been detected by F-Secure security researchers, the campaign attracting users to phishing pages that attempt to...
SpaceX has begun, on average, about 1.5 times per period during this year. From that view, the company’s 16th launch of 2017...
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of...
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search...
Canvas fingerprinting relies on websites meaning able to receive data from HTML canvas details calmly. In future, Firefox users will be required...
“I don’t remember if my data has been sold to the dark web or where this goes,” she said. “I keep getting...