The Next-gen Encryption Try temcrypt on the Web → Focused on protecting highly sensitive data, temcrypt is an advanced multi-layer …
Pict – Post-Infection Collection Toolkit
This set of scripts is designed to collect a variety of data from an endpoint thought to be infected, to …
Wholeaked – A File-Sharing Tool That Allows You To Find The Responsible Person In Case Of A Leakage
wholeaked is a file-sharing tool that allows you to find the responsible person in case of a leakage. It’s written …
Kali-Whoami – A Privacy Tool Developed To Keep You Anonymous On Kali Linux At The Highest Level
The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly …
ClearURLs – An Add-On Based On The New WebExtensions Technology And Will Automatically Remove Tracking Elements From URLs To Help Protect Your Privacy
ClearURLs is an add-on based on the new WebExtensions technology and is optimized for Firefox and Chrome based browsers. This …
Nipe – Make Tor Default Gateway For Network
Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all …
Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive …
Do you know How Many Efforts Google dedicate into Cyber Security for Secure the Digital world?
Google always Maintain the Extremely strong Cyber Security Culture for Data security, Network Security, Cloud Security and Physical security. Google’s …
iOS Privacy issue – Now iPhone apps can Secretly access your Camera to take Videos and Pictures
Google Security Engineer Felix Krause discovered a privacy loophole in iPhone which can be abused by the malicious iOS app …
Most Australians don’t care about being on a mass facial recognition database
A large chunk of Australians couldn’t give a toss about a facial recognition database. Image: Getty Images/iStockphoto By Johnny Lieu2017-10-11 …