Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to...
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to...
A specialist has found a new way to crack passwords on most modern routers The cybersecurity and digital forensic expert Jens “Atom”...
A team of security researchers working for the renowned automobile maker Toyota have developed a new car hacking tool. Dubbed as PASTA...
INFOGA INTRO:- Infoga is the tool design for gathering the email information of the company/target. This tool is written in python. Infoga...
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to...
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to...
A hacking group, suspected to be from North Korea, uses a Google Chrome extension to target victims in the academic sector. ZDNet...
New research reveals that Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking...
Thousands of devices unexpectedly printed a message supporting PewDiePie Cybersecurity and digital forensics specialists reported that during the most recent months a...
From Hacking to Report Writing From Hacking to Report Writing PDF Learn everything you need to know to become a professional security...
Facebook has launched a new bug bounty program inviting hackers to identify and report vulnerabilities in its website and applications. The social...
Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to...
Begin Ethical Hacking with Python Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just...
Advanced Penetration Testing Hacking 2017 Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just...
Sponsors paid over $100k USD for iPhone X exploits The ethical hacking event Pwn2Own 2018, conducted in Tokyo, organized by Zero Day...
ATM pentests showed alarming results for banks ATMs are vulnerable to a number of basic attack techniques that would allow any hacker...
Outlaw Hacking group uses command injection vulnerability in IoT devices and Linux servers to distribute botnets. The threat actors compromised the FTP...
Federal agencies claim that in this hacking campaign 13 firms were attacked for the benefit of a Chinese aerospace company Last Tuesday,...
Welcome to our fourth and final release of 2018, Kali Linux 2018.4, which is available for immediate download. This release brings kernel...
A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has...