Ethical Hacking/Pen Testing
Hackers started using Havoc post-exploitation framework in their attacks ,as an alternative to paid options
Ethical Hacking/Pen Testing
Lazy Script ( A perfect Automated All in 1 script for all Newbies ) for Ethical Hacking
Ethical Hacking/Pen Testing
Wifi Hacking with Fluxion (Need 2 Wifi Adapters with Monitor mode active)
Ethical Hacking/Pen Testing
Beelogger for Windows: Send Keylogs to Gmail
-
Ethical Hacking/Pen Testing2 years ago
SquarePhish: QR Code and Auth Device Code authentication Phishing tool
-
Vulnerabilities/Malwares2 years ago
Hyundai and Kia patch a bug that allowed USB cable car thefts.
-
Ethical Hacking/Pen Testing2 years ago
HackBrowserData: Decrypt passwords/cookies/history/bookmarks from the browser
-
Windows/Mac/Linux2 years ago
Google caught North Korean Hackers Using Chrome Browser Exploit on Americans
-
Mobile Hacking2 years ago
WhatsApp now supports proxy servers to bypass government restrictions.
-
Cyber Attacks/Data Breaches2 years ago
Hackers from the Russian Federation have continued to launch attacks on Ukrainian organisations with info-stealer malware.
-
Ethical Hacking/Pen Testing2 years ago
Shennina: AI engine to identify recommended exploits for the attacks, and then attempts to test and attack the targets proceeds with the post-exploitation phase.
-
Malwares2 years ago
Cybercriminals Use the Powerful BatCloak Engine to make malware undetected by AntiVirus