Image: zhushenje, ZDNet Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. …
IoT-PT – A Virtual Environment For Pentesting IoT Devices
A new pentesting virtual environment for IoT DevicesDownload Link : https://drive.google.com/open?id=1XwGqkLax2irSPpwEpeAqypl9vEywzw3DMD5 : d9c20057b14cfa3fb25f744813b828df ; SHA1: 8828d693dc6c809377bab40d2bc26f525685e287OS info and Requirements Base …
US regulators settle with CenturyLink over anti-competition violations
The US Department of Justice (DoJ) has announced the settlement of anti-competition allegations made against CenturyLink in association with the …
PowerSharpPack – Many usefull offensive CSharp Projects wraped into Powershell for easy usage
Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead …
CheckXSS – Detect XSS vulnerability in Web Applications
Detect XSS vulnerability in Web Applications Screenshots Easy InstallationAs simple as below, Just one line of code: curl -L -s …
Mac malware spreads through Xcode projects, abuses WebKit, Data Vault vulnerabilities
Xcode projects are being exploited to spread a form of Mac malware specializing in the compromise of Safari and other …
Unfollow-Plus – Automated Instagram Unfollower Bot
Automated Instagram Unfollower Bot. Installation : apt update apt install git curl -y git clone git://github.com/htr-tech/unfollow-plus.git cd unfollow-plus > Run …
For six months, security researchers have secretly distributed an Emotet vaccine across the world
Image: CDC Most of the time, fighting malware is a losing game. Malware authors create their code, distribute payloads to …
AWS Report – A Tool For Analyzing Amazon Resources
AWS Report is a tool for analyzing amazon resources. Install using PIP pip install awsreport Features Search IAM users based …
FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers
Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. There can now …