In May 2017, Kaspersky security researchers have noticed a forum post advertising ATM (Automated teller machine) malware that was targeting specific vendor...
Unfortunately, it looks like the method is still in effect. Philip Neustrom, the co-founder of Shotwell Labs, lately found two demo websites...
Ever been wondering if your ISP is hijacking your DNS traffic? Ever observed any misbehavior with your DNS responses? Ever been redirected to...
Shadow is a unique discrete-event network simulator that runs real applications like Tor and Bitcoin, and distributed systems of thousands of nodes...
Multi-platform transparent client-side encryption of your files in the cloud. Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from...
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search...
CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an...
This has been a story drifting around the internet the last few days. The victim was Elitoohey.He refined on the situation in a Reddit...
Security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the...
To comply with the law, the DPA states that Microsoft requires getting valid user consent this indicates the company must be open about...
About Getting default credentials added to commercial scanners is often difficult and slow. changeme is designed to be simple to add new...
PowerSAP is a simple powershell re-implementation of popular & effective techniques of all public tools such as Bizploit, Metasploit auxiliary modules, or...
A convention in Athens, Greece, Munro detailed some of the appalling security lapses Pen Test Partners found while investigating naval ships that...
ACLight is a tool for discovering privileged accounts through advanced ACLs (Access Lists) analysis. It includes the discovery of Shadow Admins in...
Programming Languages : BASH RUN [email protected]:~# bash ./anti-ddos.sh Cloning an Existing Repository ( Clone with HTTPS ) git clone https://github.com/ismailtasdelen/Anti-DDOS.git Cloning an...
DET (is provided AS IS), is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the...
The Bitcoin rose by higher than 8% to $5,243 having begun the year at $966. Bitcoin has risen by more than 750%...
A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First presented at...
drinkme is a shellcode test harness. It reads shellcode from stdin and executes it. This allows pentesters to quickly test their payloads...
What if I told you that there is a method will let you execute commands on Microsoft Word without any Macros, or...
Security researchers from AccessNow have discovered a new Facebook phishing scam that can also fool a professional technical user into falling victim...