StegCracker – Brute-force Utility to Uncover Hidden Data Inside Files

Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message.This technique permits sender and receiver to communicate secretly and the third party won’t mindful of the correspondence happen. Steganalysis is the process of recovering hidden data, It decides the encoded hidden message, and if conceivable, it […]

New Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs

Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part of a targeted campaign appears to be attacking a Russian state health care institution. The vulnerability, tracked as CVE-2018-15982, is a use-after-free flaw resides in Flash Player that, if exploited successfully, allows an […]

This Hidden Chrome Page Shows All Interstitial Warnings From Google

Hundreds of thousands of dangerous websites are out there on the Internet, waiting for you to trigger malware once you open them. Therefore, Google Chrome presents an interstitial warning for the websites that, it feels, are unsafe for the user. Most of the Google Chrome users have encountered an interstitial warning page on their system. If you don’t […]

Find hidden subdomains with DNSMap

DNSMap: Dnsmap is a tool used to gather subdomains & information of subdomains for a target host, as per ethical hacking courses. It was developed in 2006 and last updated in 2010. This package consists of 2 scripts – dnsmap, and dnsmap-bulk.sh. Dnsmap is used in scanning single domain and dnsmap-bulk.sh in bulk domains. According […]

TimpDoor Android malware turning devices into hidden proxies

Android users in North America are the current target of TimpDoor malware. The McAfee Mobile Research team has identified an active phishing campaign that traps users by sending an SMS to influence them on downloading and installing an Android malware app TimpDoor. It is a fake voice-message app that allows attackers to infect the devices and […]

New Android Malware Turns Your Mobile Devices into Hidden Proxies

Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious app installing a fake voice-message app and turns it as a network proxies without users knowledge. This Malware named as TimpDoor that act as a backdoor with stealthy access to the home and corporate network […]

Cryptomining software is hidden as Flash update

A cryptocurrency mining malware is disguised as a Flash update that appears to be legitimate, warn researchers Cryptomining popularity exploded in 2017 when Ethereum’s value soared to unsuspected levels. The rush to exploit this opportunity area had a significant effect on the graphics card market, inspiring countless companies to launch their own virtual assets, which […]

North Korean HIDDEN COBRA Hackers Using New Attack Called “FASTCash” to Cash-out From ATM Machine

North Korean governments sponsored & worlds most famous hacking group HIDDEN COBRA using a new Attack called  “FASTCash” to cash out from the ATM Machine by compromising the bank server. Attackers using a various mechanism to compromise and maintain the persistance in the victim’s network. In this case, FBI & DHS issued a serious warning about this cyber […]

25 Malicious apps that Downloaded More Than 120,000 Times Contains Hidden Cryptomining Script

Malware authors continue to upload malicious apps contains hidden Cryptomining Script to Google play, even though it was entirely banned. Attackers uploaded apps poses as games, utilities, and educational apps contain hidden cryptomining scripts. SophosLabs spotted more than 25 malicious apps that contain hidden coinhive cryptomining scripts turning victims device into cryptocurrency churning rigs. 11 […]

Top 12 Hidden iOS 12 Features Apple Didn’t Talk About At WWDC 2018

With Apple set to release newer models of iPhone, iPad and Apple Watch on September 12 this year, everyone has eyes on the stable update of the new iOS version iOS 12. When Apple announced iOS 12 in the WWDC 2018, there were many new features introduced such as grouped notifications, DND at bedtime, improved […]

A New Ransomware Attack Posed as Windows Activator Emerging in Wild With Hidden Functions

A new ransomware distributed by attackers posing as a Windows Activator appearing to be distributed through external network drives. The ransomware found to be active from August 7th and spreading since then. Researchers from 360totalsecurity spotted the ransomware contains hidden configuration function and the information used for encryption. Once the ransomware execution started it executes […]

How To Unlock And Use Hidden Thesaurus In iOS 12?

iOS 12 is set to roll out next month in Apple’s official iPhone launch event. The latest version of iOS brings many new features such as improvements in the photos app, USB restricted mode, grouped notifications, etc. Apart from these new features, Apple has also added some small but handy features to improve the overall […]

9 Android Pie Hidden Features: Best Android 9 Tricks You Might Have Missed

Now that Android Pie is live, there are way too many exciting features to look up to. While some will get easily identified, few others might get lost or maybe completely forgotten in our daily usage. Like, did you know? You can roll back to the three-button navigation system from the new Android Pie Gesture Navigation. Well […]

Aron – A GO Script For Finding Hidden GET & POST Parameters

Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron $ cd aron $ go get github.com/m4ll0k/printer # now check if $GOPATH is set $ go env | grep -i gopath # if $GOPATH not set, try with: $ export GOPATH=$HOME/go $ go […]

Cansina – Open Source Hidden Content Discovery Tool

Reconnaissance is one of the first steps to conduct within a pen test engagement. During this stage, information is gathered using different tools and sources. Some web applications may hide web resources from public, there is however a way to discover the hidden content. Cansina is one such open source tool that helps aid in […]

A Hidden Bug In The System Puts 21,000 U.K. Students At Risk

A hidden bug found within an information management system may have compromised the data of 21,000 U.K. schools, who are all now at risk of a possible breach. It appears the matching algorithm of student records of the system is failing and producing incorrect results when queried. The glitch introduced a peculiar bug where students were […]

NSA Spying Centers Hidden Inside AT&T Buildings In 8 US Cities

The Intercept, the publication known for its groundbreaking reports, has come up with another revealing piece (via TechCrunch) about the National Security Agency. The report describes 8 AT&T data facilities that serve as hubs for NSA’s spying activities. The eight facilities are located in major US cities, including Atlanta, Chicago, Dallas, LA, New York City, San […]

8 Google Maps hidden places You are not allowed to see

If you thought you have seen it all then you were wrong. In fact, thanks to Google Maps there are plenty of places that are kept hidden from the public view – It is also a fact that Google Maps has deliberately hidden these places. But why? The reason for this censorship is mostly unknown, however, there […]