Top News

Iranian hacker group developed Android malware to steal 2FA SMS codes

Security firm Check Point said it uncovered an Iranian hacking group that has developed special Android malware capable of intercepting … 0 31
CRLFMap, Downloads, Fuzz, golang, Hacking Tools, Linux, Scan, Scanner

CRLFMap – A Tool To Find HTTP Splitting Vulnerabilities

CRLFMap is a tool to find HTTP Splitting vulnerabilities Why? I wanted to write a tool in Golang for concurrency … 0 37
DalFox, Dork Scanner, dorkX, Downloads, Google, Google dork, Hacking Tools, Scanner

dorkX – Pipe Different Tools With Google Dork Scanner

Pipe different tools with google dork Scanner Install [email protected] ~/dorkX> git clone [email protected] ~/dorkX> cd dorkX [email protected] ~/dorkX> go … 0 33
Top News

Human biohacking: an exciting prospect, but only for the rich?

A multi-nation study finds that many of us consider biohacking exciting, but fears concerning hacking and privacy remain.  Human augmentation … 0 37
Top News

US charges five hackers part of Chinese state-sponsored group APT41

(Image: file photo) The US government has filed charges today against five Chinese nationals for hacking into more than 100 … 0 50
Arch Linux, Console, Croc, Data Transfer, Downloads, Encryption, File Sharing, golang, Hacking Tools, Linux, MacOS, Pake, Peer to Peer, Unix, Windows

Croc – Easily And Securely Send Things From One Computer To Another

croc is a tool that allows any two computers to simply and securely transfer files and folders. AFAIK, croc is … 0 50
Top News

Firefox bug lets you hijack nearby mobile browsers via WiFi

Image: Lukas Stefanko Mozilla has fixed a bug that can be abused to hijack all the Firefox for Android browsers … 0 24
Top News

PHoS Recommendation: Attacking Secret Sharing ~ Vapra

VEvent: 19th Sep 2020, 05:30 PMGiven a secret, is there any way to split it into N pieces in such … 0 49
Top News

PHoS Recommendation: Behavioural Malware Analysis 101 ~ Vapra

VEvent: 19th Sep 2020, 04:00 PMSetup a safe lab environment using open-source tools to perform basic malware analysis. Will include … 0 41

The keys to your house belong to startups

Whoa, you love reading! Take a moment to join us on social media.