As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
Anonymous, a loose collective of hacktivists, have called Islamic State militants (ISIS) as gangsters who…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
DNSRecon is a python script used for DNS information gathering. DNS information about a target…
Hacktronian is an open-source penetration testing framework designed for social engineering and multiple server…
What is JFScan? JFScan is a great enumeration tool created by nullt3r written mainly in…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Anyone here tired of dual booting to get into your Kali machine? Or configuring VMware…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
Get ready to git this cloned as soon as possible, MHDDoS. This Distributed Denial of…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Protect your Facebook Password Found this one while I was on Safari. Its a pretty…
Wifi Pumpkin is a security audit framework used to test the security of wifi against…
As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
With virtually every aspect of your business in digital form now, it is far past…
Anonymous, a loose collective of hacktivists, have called Islamic State militants (ISIS) as gangsters who…
The text prediction feature in iOS 8 seems to be faulty and predicts sensitive strings…