Just days before its annual information security training summit starts in Cancun, Mexico, Kaspersky Lab announced an extension to its bug bounty...
BootStomp is a Python-based tool, with Docker support that helps you find two different classes of Android bootloader vulnerabilities and bugs. It...
Open Bug Bounty consists of a team of no more than 10 researchers from several countries with backgrounds in IT, cyber security and law,...
Reports say that there has been a 31 percent increase in the number of software vulnerabilities in 2017 compared to 2016 and...
An OSINT tool to find contacts in order to report security vulnerabilities. Installation Linux Make sure you have installed the whois and...
Cryptocurrency Mining Malware performing a crypto mining attack by exploiting the vulnerabilities in the popular database system. According to their global Sensor reports...
Microsoft has released February’s cumulative updates for Windows 10, better known as Patch Tuesday. The reason why the update is worth getting...
The private exploit seller is expanding its reach to acquire bugs in popular Linux builds. Zerodium is offering $45,000 to hackers willing...
Uniscan is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner. Requirements: Kali Linux Uniscan (Comes Pre-Installed...
Recently patched critical Microsoft office vulnerabilities are used for distributing powerful Zyklon Malware that has some sophisticated functionalities such as creating a backdoor...
Zyklon is a publicly available, full-featured backdoor capable of keylogging, password harvesting, downloading and executing additional plugins, conducting distributed denial-of-service (DDoS) attacks,...
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715...
Researchers have discovered severe vulnerabilities in the suite which can lead to full system takeover. Security researchers have discovered a set of...
The iPhone maker has confirmed all Mac systems and devices running iOS are affected by the vulnerabilities, but also said there are...
Earlier today, we reported on some shocking news — there is a serious vulnerability that affects Intel processors. To make matters worse, patching...
Security researchers discovered multiple vulnerabilities dubbed “Trackmageddon” which affects GPS services and online location tracking devices. The vulnerabilities with GPS location tracking...
Autorize is an automatic authorization enforcement detection extension for Burp Suite. It helps you detect authorization vulnerabilities. It is sufficient to give to...
The year 2017 experienced many sophisticated cyber attacks which have been made a huge impact on the organization as well as individuals....
JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc. Requirements Python...
Cyber attacks continue to be the major nightmare for most of the business, and most of that is because of the vulnerabilities...
Apple had to rush in to make a quick update on serious vulnerabilities in macOS. The vulnerability hole was so serious that...