Browsing tag

Mac

Best way to Remove Malware on Mac, Including Other Unwanted Apps

Some Mac apps are so persistent that you can’t use traditional methods to remove them. Even if you do, there will always be some app remnants that clog up your system’s memory and resources. Programs like malware are case in point. They’re notoriously hard to remove, and even if you get rid of the main […]

Dirhunt v0.6.0 – Find Web Directories Without Bruteforce

DEVELOPMENT BRANCH: The current branch is a development version. Go to the stable release by clicking on the master branch. Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the “index of” mode enabled. Dirhunt is also useful if the directory listing is […]

SQLMap v1.2.11 – Automatic SQL Injection And Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the […]

Apple’s T2 Security Chip Is Currently Blocking Linux From Booting

Linux enthusiasts must be knowing that one can run Linux distributions on Apple’s older hardware, including the MacBook Air. The quality of Apple’s solid hardware had even prompted Linux creator Linus Torvalds to use MacBook Air to run Linux in the past. However, the newer lineup Apple hardware is becoming increasingly hostile towards Linux. With […]

Widely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

A cryptocurrency app, CoinTicker which is widely used in cryptocurrency industry pushing 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities. CoinTicker app actually appears as a legitimate application that helps to peoples who is willing to enter into cryptocurrency industries and make an investment. This is working in a […]

PasteJacker – Add PasteJacking To Web-Delivery Attacks

The main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in this attack in one place and one automated job as after searching I found there’s no tool doing this job the right way. Now while this attack depends on what the user will […]

Python-Nubia – A Command-Line And Interactive Shell Framework

Nubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive shell (aka. ldshell)” at Facebook. Since then it was factored out to be a reusable component and several internal Facebook projects now rely on it as a quick and easy way to get an intuitive shell/cli […]

CT-Exposer – An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs

Discover sub-domains by searching through Certificate Transparency logs. What is CT? Certificate Transparency (CT) is an experimental IETF standard. The goal of it was to allow the public to audit which certificates were created by Certificate Authorities (CA). TLS has a weakness that comes from the large list of CAs that your browser implicitly trusts. […]

WPScan v3.3.1 – Black Box WordPress Vulnerability Scanner

WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites. INSTALL Prerequisites: Ruby >= 2.2.2 – Recommended: 2.3.3 Curl >= 7.21 – Recommended: latest – FYI the 7.29 has a segfault RubyGems – Recommended: latest From RubyGems: gem install […]

Ducky-Exploit – Arduino Rubber Ducky Framework

Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky. This script has been tested on Kali Linux 18.2 Ubuntu 18.04 Windows Works with both Python2 and Python3InstallationUbuntu and Kali Usage git clone https://github.com/itsmehacker5/Ducky-Exploit.git cd Ducky-Exploit/ python ducky.py Screenshots     Download Ducky-Exploit Download WordPress Themes Free Download Premium WordPress Themes […]

Lazarus Group launches Mac malware for the first time

The malware has been spread through a cryptocurrency exchange hack Lazarus Group, the North Korean hacker group responsible for the attack on Sony films a few years ago, has launched its first malware for MAC, according to cyber security organization specialists from the International Institute of Cyber Security. In a recently published report, researchers reported that Lazarus […]

You can now run Windows 95 on your Mac, Linux and Windows 10 devices

The maximum RAM that Windows 95 consumes within Windows 10 is just 200 MB. We have seen hackers doing wonders like hacking PlayStation 4 to run PS2 emulation or homebrew software, hacking Android-compatible Google Daydream VR Controller to run on iOS or run Linux OS on Nintendo Switch. But now, a developer has gone one step ahead […]

Aircrack-ng 1.3 – Complete Suite Of Tools To Assess WiFi Network Security

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools. Attacking: Replay attacks, deauthentication, fake access points and others via packet injection. Testing: Checking WiFi cards and driver […]

Top 7 Most Popular and Best Cyber Forensics Tools

We often watch experts in movies using forensic tools for their investigations but what cyber forensic tools are used by experts? Well, here are top 7 cyber forensic tools preferred by specialists and investigators around the world. “Torture the data and it will confess to anything” Ronald Coase. Cyber forensic: As the title says, it is […]

Cryptocurrency users on Discord & Slack hit by MacOS malware

Hackers are using a new MacOS malware aimed at cryptocurrency investors on Discord and Slack group chat communities. The malware was initially discovered by an IT security expert Remco Verhoef and later analyzed by Patrick Wardle, a former NSA white hat hacker and malware researcher. Dubbed OSX.Dummy; the malware has been developed in such a way that […]

The Rogue Toolkit – An Extensible Toolkit Aimed At Providing Penetration Testers An Easy-To-Use Platform To Deploy Access Points

  The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for the purpose of conducting penetration testing and red team engagements. By using Rogue, penetration testers can easily perform targeted evil twin attacks against a variety of wireless network types. Rogue was originally […]