Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool, with 32 templates +1 customizable and it works only on LAN. Blackeye Usage git clone https://github.com/thelinuxchoice/blackeye cd blackeye bash blackeye.sh Disclaimer This tool was made for educational purposes! Using BlackEye for attacking targets without prior […]

FLARE VM – a fully customizable, Windows-based security distribution for malware analysis, incident response & penetration testing

FLARE VM is the first of its kind freely available and open sourced Windows-based security distribution designed for reverse engineers, malware analysts, incident responders, forensicators, and penetration testers. Inspired by open-source Linux-based security distributions like Kali Linux, FLARE VM delivers a fully configured platform with a comprehensive collection of Windows security tools such as debuggers, […]

Backdoor.Remvio: Highly customizable remote access Trojan sold online

The new Trojan can be used to steal information and passwords from compromised computers. Symantec recently noticed that an Italian malware author called z3r0 is selling a new remote access Trojan in an underground forum. The software is a back door threat that can be purchased for somewhere between US$58 and $389 in bitcoins depending […]

Arch Linux 2016.06.01 Released, Download The Most Customizable Linux Distro Here

Short Bytes: Arch Linux, one of the most customizable Linux distros around, is here with the latest Arch Linux 2016.06.01 release. This monthly ISO respin is powered by Linux kernel 4.5.4 and includes all the changes made since May 1, 2016. The existing Arch users need to simply execute “sudo pacman -Syu” to update their Arch […]

Lost Door RAT: Accessible, Customizable Attack Tool

We recently came across a cyber attack that used a remote access Trojan (RAT) called Lost Door, a tool currently offered on social media sites. What also struck us the most about this RAT (detected as BKDR_LODORAT.A) is how it abuses the Port Forward feature in routers. Using this feature enables remote systems to connect […]