CloudFail Credits: m0rtem CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in...
Hacking TOR Hidden Services What is Tor ? Tor stands for The Onion Route it aims to conceal its users identities and...
Short Bytes: At some point, you would have owned an Android device, but have you ever managed to scratch the surface of its...
A Malware called Hworm Performing multiple Attacks including steal passwords from Firefox, Opera, and Chrome browsers, ability to log keystrokes, kill running...
SophosLabs has discovered a new spam campaign where ransomware is downloaded and run by a macro hidden inside a Word document that is...
Short Bytes: Want to create Tor’s hidden .onion URL of a website? A free tool named Enterprise Onion Toolkit (EOTK) can help you...
Short Bytes: Google’s Smart Lock includes various methods to unlock an Android device. You can use voice recognition, facial recognition or a...
Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The...
Steghide, is a tool that executes a brute force attack to file with hide information and password established. Linux operating system Steghide Python...
Steganography, the technique of embedding hidden messages inside public files, has become very popular with exploit kit operators in 2016. Several security...
A Python open source toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination, it...
Researcher: FBI was likely enabled to run half of all child porn sites on the servers. As Ars has reported, federal investigators temporarily...
Short Bytes: Messenger is a popular instant messaging platform. It supports text messaging, voice, and video calls. People can also send photos,...
Short Bytes: Do you know about the “Normal Reload”, “Hard Reload”, and “Empty Cache with Hard Reload” option in your web browser? These...
Quick and handy APK backdoor embedder with metasploit android payloads. Requirements: metasploit Installation and execution: Then you can download smap by cloning...
The Signal encrypted messaging application on Tuesday added disappearing messages to its array of privacy features. Disappearing messages gives users the ability...
Short Bytes: What are the signs that you should look for before joining a coding class? Apart from the love for programming,...
As technology matures and microprocessors are becoming cheap we are starting to see a trend of products that are now ?smart.? The...
Bluetooth Low Energy devices like smart watches, “wearables,” give you up all day. My new neighbor was using AirDrop to move some files...
According to security researcher Timothy Davies, a new version of the Locky Ransomware, aka Zepto, has been circulating since around the September 5th 2016 that...