In total, ethical hackers earned $1.2 million in the bug bounty competition. Bug bounty programs have to be one of the most...
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect...
Social media security flaws can have disastrous consequences for individuals due to their massive use and the amount of sensitive information circulating...
Security flaws in components, communications, or protocols most commonly used in the industry can have disastrous consequences. Experts in ethical hacking from...
Hundreds of new variants of malware for mobile devices were detected last year. Among all these malicious developments, one caught the attention...
From the first weekend of February, a hacker group self-appointed as OurMine began compromising some relevant Twitter accounts in the sports world,...
It’s been a long delay since the release of Parrot OS 4.7 and all ethical hackers and pentester are eagerly waiting for...
Reporting vulnerabilities on Internet of Things (IoT) devices has become very common among ethical hacking experts. One of the latest reports has...
A new ransomware incident has harshly affected a major automotive company. Gedia Automotive Group, a German car parts manufacturer with nearly 5,000...
In Germany, three expert researchers in information security and ethical hacking revealed a method to hack the McDonald’s mobile app; using some...
As last year, this year we made a ranking with the most popular tools between January and December 2019. Topics of the...
Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploits, Pown.js...
Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run during...
nmapAutomatorA script that you can run in the background! SummaryThe main goal for this script is to automate all of the process...
An Obfuscation-Neglect Android Malware Scoring System ConceptsAndroid malware analysis engine is not a new story. Every antivirus company has their own secrets...
A normal flask web app to learn win32api with code snippets and references. PrerequisiteYou need to download the following package before starting...
What’s PAKURIIn Japanese, imitating is called “Pakuru”. ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru) eat with a wide open mouth...
Pylane is a python vm injector with debug tools, based on gdb and ptrace. Pylane uses gdb to trace python process, inject...
Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack...
huskyCI is an open-source tool that performs security tests inside CI pipelines of multiple projects and centralizes all results into a database...
Shelly adalah sebuah tool sederhana yang ditulis menggunakan Python, yang berfungsi untuk meremote sebuah website Instalation :$ git clone https://github.com/tegal1337/Shelly $ cd...