XAttacker is a Website Vulnerability Scanner & Auto Exploiter developed by Mohamed Riahi Auto Cms Detect [1] WordPress : [+] Adblock Blocker...
The maker of a sneaky adware that hijacks a user’s browser to serve ads is back with a new, more advanced version...
Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called...
Amber is a proof of concept packer, it can pack regularly compiled PE files into reflective PE files that can be used...
Automated script to search in SMB protocol for availables pipe names. Requirements metasploit-framework wget pipe_audit_v2.rb module (https://github.com/peterpt/pipe_auditor_fb) – It will be installed...
sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the...
Zeus is an advanced reconnaissance utility designed to make web application reconnaissance simple. Zeus comes complete with a powerful built-in URL parsing...
A proof-of-concept tool for generating payloads that exploit unsafe .NET object deserialization. Description ysoserial.net is a collection of utilities and property-oriented programming...
If you’re currently working on a macOS-powered machine, there are good chances that you might be running the latest macOS High Sierra operating...
Web Privacy Measurement is the observation of websites and serves to detect, characterize and quantify privacy-impacting behaviors. Applications of Web Privacy Measurement...
OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as...
This small script will simulate fake processes of analysis, sandbox and/or VM software that some malware will try to avoid. You can...
Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to...
Tweep is an advanced Twitter scraping tool written in python that allows for scraping Tweets and pictures from Twitter profiles without using...
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds...
During the last hours, ESET researchers noticed that Eltima, the makers of the Elmedia Player software, have been distributing a version of their...
If you have updated your MacOS from the older version to MacOS High Sierra make sure you also apply the new security patch released...
EFI Firmware Attack is one of the most popular and critical tips that any security expert strongly suggests to follow to avoid...
We’ve been hearing the phrase “year of the Linux desktop” from times immemorial. The FOSS and Linux community tosses up this idea...
We all know what CIA is capable of but what WikiLeaks has been publishing lately under the Vault 7 leaks series is...
Yes, even Mac could have viruses that could spy on their users silently. So if you have a Mac and think it...