╔═╗┌─┐┌─┐┌┐┌╦═╗┌─┐┬ ┌─┐┬ ┬╔╦╗┌─┐┌─┐┬┌─┐ ║ ║├─┘├┤ │││╠╦╝├┤ │ ├─┤└┬┘║║║├─┤│ ┬││ ╚═╝┴ └─┘┘└┘╩╚═└─┘┴─┘┴ ┴ ┴ ╩ ╩┴ ┴└─┘┴└─┘ Tool to test for …
Apple joins FIDO Alliance, commits to getting rid of passwords
We all use passwords. We also all suck at using them. 81% of all hacking-based security breaches can be traced …
KawaiiDeauther – Jam All Wifi Clients/Routers
Kawaii Deauther is a pentest toolkit whose goal is to perform jam on WiFi clients/routers and spam many fake AP …
Emotet trojan evolves to spread via WiFi connections
Without a doubt, the Emotet trojan is today’s top malware threat, in both terms of quantity (due to its huge …
5 Signs You Have a Bad VPN
How do you choose a VPN? What is the basic criterion? Price? Coverage? Quality? What to consider choosing the best …
XSS-Freak – An XSS Scanner Fully Written In Python3 From Scratch
XSS-Freak is an XSS scanner fully written in python3 from scratch. It is one of its kind since it crawls …
Top Ten security settings for a secure Windows 10 Computer
Windows 10 is by far the most acknowledged Windows operating system. Microsoft rolls out updates frequently to ensure bugs are …
DOJ charges four Chinese military hackers for Equifax hack
The US Department of Justice announced today charges against four Chinese hackers for breaching US credit reporting agency Equifax in …
Pytm – A Pythonic Framework For Threat Modeling
Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm …
InjuredAndroid – A Vulnerable Android Application That Shows Simple Examples Of Vulnerabilities In A CTF Style
A vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for a …