Image via now-defunct Infinity Black website Europol announced today the arrest of five Polish hackers who were part of the …
Generator-Burp-Extension – Everything You Need About Burp Extension Generation
Everything You Need About Burp Extension Generation InstallationFirst, install Yeoman and generator-burp-extension using npm (we assume you have pre-installed node.js). …
Academics turn PC power units into speakers to leak secrets from air-gapped systems
Image: IgorShubin Academics from an Israeli university have published new research last week showing how an attacker could turn a …
Invoker – Penetration Testing Utility
Penetration testing utility.The goal is to use this tool when access to some Windows OS features through GUI is restricted.Some …
How The Latest Plugin And Theme Helps To Avoid WordPress Vulnerability?
Are you running a WordPress website? If yes, then you must learn about the fact that there is several WordPress …
Hackers breach LineageOS servers via unpatched vulnerability
Hackers have gained access to the core infrastructure of LineageOS, a mobile operating system based on Android, used for smartphones, …
OSSEM – A Tool To Assess Data Quality
A tool to assess data quality, built on top of the awesome OSSEM project. Mission Answer the question: I want …
Hacker leaks 15 million records from Tokopedia, Indonesia’s largest online store
A hacker has leaked on Friday the details of 15 million users registered on Tokopedia, Indonesia’s largest online store. The …
Powershell-Reverse-Tcp – PowerShell Script For Connecting To A Remote Host.
PowerShell script for connecting to a remote host.Remote host will have full control over client’s PowerShell and all its underlying …
New Firefox service will generate unique email aliases to enter in online forms
Image: Mozilla Browser maker Mozilla is working on a new service called Private Relay that generates unique aliases to hide …