A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management systems (CMS), and SaaS platforms...
An emerging Python-based credential harvester and a hacking tool named Legion is being marketed via Telegram as a way for threat actors...
A nascent information stealer called Mars has been observed in campaigns that take advantage of cracked versions of the malware to steal...
Organizations’ cybersecurity capabilities have improved over the past decade, mostly out of necessity. As their defenses get better, so do the methods,...
Phishing is still one of the widely used strategies by cybercriminals and espionage groups to gain an initial foothold on the targeted...
Set of tools for creating/injecting payload into images. Useful references for better understanding of pixload and its use-cases: Bypassing CSP using polyglot JPEGs...
Infamous Turla APT Hackers group renew its arsenal with a new hacking tool named “Topinambour ” also called as aka Sunchoke that...
Researchers spotted a new wave of cyber attack from Russian speaking hacker who uses the weaponized TeamViewer to compromise and gain the...
We have compiled a list of top hacking software and tools of 2019 with their best features and download links. This list...
If analyzing data traffic and network protocols are something you are interested in, Wireshark is the go-to tool. It’s the world’s leading...
The main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in...
Security company NCC Group have released an open source tool for penetration testing named Singularity, the tool allows security researchers to test...
There are tons of automated tools and services that any shady hacker can employ to grab the public data on Facebook, Twitter,...
The U.S Finally identified the suspect who involved the CIA Vault 7 Hacking Tool leaks that contains the Powerful cyber weapons that...
WikiLeaks Revealed a new document of CIA Secret operations called “ExpressLane” that conducts against CIA’s information sharing Service Partners (liaison services) like NSA,DHS ,and FBI....
Wikileaks Revealed Next CIA Hacking Tool called “Brutal Kangaroo” under Vault 7 Projects that Consists of 4 Powerful Malware Components which targets...
Short Bytes: The non-profit whistleblower Wikileaks has published 6 new documents disclosing information about Hive, a back-end infrastructure used to manage CIA...
Short Bytes: The BackBox developers have released the latest version of their ethical hacking Linux distro, i.e., BackBox Linux 4.7. It comes with...
Short Bytes: Your desire to master the art of Facebook hacking can harm you in a big way. Recently, a variant of Remtasu...