A lot of people think that they can do whatever they want on the Internet and remain anonymous. However, we …
Jaeles v0.9 – The Swiss Army Knife For Automated Web Application Testing
Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled …
AutoRDPwn v5.1 – The Shadow Attack Framework
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This …
New Unc0ver jailbreak released, works on all recent iOS versions
Image: Unc0ver Team A team of hackers, security researchers, and reverse engineers have released today a new jailbreak package for …
Locator – Geolocator, Ip Tracker, Device Info By URL (Serveo And Ngrok)
Geolocator, Ip Tracker, Device Info by URL (Serveo and Ngrok). It uses tinyurl to obfuscate the Serveo link.Legal disclaimer:Usage of …
25 million user records leak online from popular math app Mathway
Image: Mathway A hacker has breached Mathway, a popular math solving application, from where they have stolen more than 25 …
Chrome: 70% of all security bugs are memory safety issues
Image: Google Roughly 70% of all serious security bugs in the Chrome codebase are memory management and safety bugs, Google …
Faraday v3.11 – Collaborative Penetration Test and Vulnerability Management Platform
This new release brings strong improvements to your security team’s daily performance, allowing them to operate quicker and smarter by …
6 Ways to Beat Hackers from Invading Your Phone
Technological advancement has seen smartphones become a crucial part of our lives. There are radical changes that have taken place …
Ransomware deploys virtual machines to hide itself from antivirus software
The operators of the RagnarLocker ransomware are installing the VirtualBox app and running virtual machines on computers they infect in …