C-shellcode to hex converter. Handy tool for paste & execute shellcodes in gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & …
WSuspicious – A Tool To Abuse Insecure WSUS Connections For Privilege Escalations
This is a proof of concept program to escalate privileges on a Windows host by abusing WSUS. Details in this …
Hacker leaks data of 2.28 million dating site users
Image: ZDNet A well-known hacker has leaked this week the details of more than 2.28 million users registered on MeetMindful.com, a …
Xnuspy – An iOS Kernel Function Hooking Framework For Checkra1N’Able Devices
Output from the kernel log after compiling and running example/open1_hook.c xnuspy is a pongoOS module which installs a new system …
Rogue CCTV technician spied on hundreds of customers during intimate moments
Image: Cyrus Crossan A Texas-based CCTV technician pleaded guilty this week to illegally accessing the security cameras of hundreds of …
Sigurlx – A Web Application Attack Surface Mapping Tool
endpoint > js …” name=”twitter:description”> endpoint > js …” name=”description”> endpoint > js …” property=”og:description”> sigurlx a web application attack …
FSB warns of US cyberattacks after Biden administration comments
Vladimir_Timofeev, Getty Images/iStockphoto The Russian government has issued a security alert on Thursday evening warning Russian businesses of potential cyberattacks …
WPCracker – WordPress User Enumeration And Login Brute Force Tool
WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control …
QNAP warns users of a new crypto-miner named Dovecat infecting their devices
Image: QNAP Taiwanese hardware vendor QNAP has published a security advisory today warning customers of a new malware strain named Dovecat that …
Reconftw – Simple Script For Full Recon
This is a simple script intended to perform a full recon on an objective with multiple subdomains tl;dr Requires Go …