The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other …
China, Iran, and Russia worked together to call out US hypocrisy on BLM protests
Government officials and state-controlled media in China, Iran, and Russia are working collectively to call out US hypocrisy on the …
GitMonitor – A Github Scanning System To Look For Leaked Sensitive Information Based On Rules
GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are …
How to Track My Boyfriend’s phone without him knowing?
Spying on your boyfriend can get you in trouble if you are not doing it the right way. A lot …
Incognito mode detection still works in Chrome despite promise to fix
Websites are still capable of detecting when a visitor is using Chrome’s incognito (private browsing) mode, despite Google’s efforts last …
Facebook software engineer resigns with scathing criticism of the network’s refusal to act on ‘weaponized hatred’
A Facebook software engineer has publicly resigned over how the social network is handling US President Trump’s posts throughout the …
Ligolo – Reverse Tunneling Made Easy For Pentesters, By Pentesters
Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety …
GhostShell – Malware Indetectable, With AV Bypass Techniques, Anti-Disassembly, And More
In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning …
G Suite Marketplace primed for a privacy scandal, researchers warn
Image: ZDNet In research presented last month, security researchers said that many of the apps listed on the G Suite …
Enumy – Linux Post Exploitation Privilege Escalation Enumeration
Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation …