hackers tools

  1. Serafim

    Hacking Watcher - Open Source Cybersecurity Threat Hunting Platform

    Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should be used on webservers and available on Docker. Watcher capabilities Detect emerging vulnerability, malware using social network & other RSS sources...
  2. Lucky

    Hacking XSS-Scanner - XSS Scanner That Detects Cross-Site Scripting Vulnerabilities In Website By Injecting Malicious Scripts

    XSS Scanner Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP Top 10 project and it is a highly chased vulnerability in bug bounty programs. The scanner gets a link from the user and scan the website for XSS...
  3. Otto

    News Hackers who hacked solarwinds bypassed multi-factor authentication

    As SecurityLab wrote earlier, on December 13, SolarWinds reported that it was the victim of a cyber attack on the supply chain. Hackers funded by a foreign government broke into the networks of an American software manufacturer and implemented a malicious update for its Orion software in order...
  4. xanix

    News Google has launched a knowledge base about XS-Leaks vulnerabilities

    Google announced the launch of a knowledge base with information about a class of vulnerabilities, XS XS-leaks. These vulnerabilities are related to incorrect use of the usual behavior of the web platform by modern web applications, which leads to leakage of information about the user or...
  5. al capone

    News Hackers who attacked the Embraer aircraft manufacturer published part of the stolen data

    Brazil's Embraer, which is now considered the third-largest aircraft manufacturer after Boeing and Airbus, was the victim of a ransomware cyberattack last month. Now hackers who compromised the aircraft company's network have published some of the confidential data, as Embraer refused to...
  6. Otto

    News Analysis of 4,000,000 Docker images showed that half of them contain critical vulnerabilities

    Researchers from Prevasio studied 4,000,000 public Docker images hosted on Docker Hub and found that more than half of them have critical vulnerabilities, and several thousand images contain malicious or potentially dangerous elements. For the analysis, the specialists used their own Prevasio...
  7. Tasken

    News New spyware used by North Korean hackers from Kimsuky discovered

    Security researchers from the company Cybereason told about the new malware that was used by the North Korean group Kimsuky (also known as Black Banshee, Velvet Chollima and Thallium) during attacks on government institutions in South Korea. Earlier, the cybersecurity and infrastructure...
  8. xanix

    Tips Find local Bin's in your area

    Finding Local Bins In Your Area When I first started i burned several hundred dollars on bins i thought would work but didn't. If you want to increase your chances of success or just want to find some new bins this article might help you. *** Hidden text: You do not have sufficient rights to...
  9. Serafim

    Hacking PatchChecker - Web-based Check For Windows Privesc Vulnerabilities

    Using PatchChecker to check vulnerabilities: To use the patchchecker, you can either go to the publicly hosted website here at patchchecker.com or you can git clone this repo, install the required libraries, makes sure patches.db is in the same directory as app.py and then start the application...
  10. al capone

    Hacking Browser Blocker for Windows - Block Browsers from accessing the internet on Windows

    Browser Blocker for Windows blocks common browsers from accessing the internet on Windows. To block just run the batch as admin (Right click > Run as administrator) and select the browser. Download: Download Browser Blocker for Windows rar Download Browser Blocker for Windows rar
  11. Serafim

    Hacking Zphisher - Automated Phishing Tool

    Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal . It also has 4 Port Forwarding Tools ...
  12. Wisp

    News Hackers from Azerbaijan hacked a number of state websites of Armenia

    At the moment, dozens of servers of the country's official structures have been destroyed, including their copies. It is specified that among the hacked portals are the sites of the President of Armenia, the head of the Nagorno-Karabakh Republic, as well as all ministries of the state. On these...
  13. Wisp

    News Dominican Republic arrested leaders of hackers who hacked Nintendo consoles

    There is a difference between Xecuter activity and non-commercial hacking or console emulation. The US Department of Justice reported that, at their request, the Dominican Republic police arrested Chinese Yuanning Chen, Frenchman Max Loarn and Canadian Gary Bowser. It is assumed that they were...
  14. Dorblue

    Tips Non-AVS Non VBV | Guide

    AVS AVS is an address verification system and many sites use this to verify that this card is not used by scammers. But some cards don’t have AVS protection and sites cannot determine the address to which the card is registered. Bill-ship This is one of the most asked questions. Because By the...
  15. Jaysu

    Hacking DNSteal - DNS Exfiltration Tool For Stealthily Sending Files Over DNS Requests

    This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. Below are a couple of different images showing examples of multiple file transfer and single verbose file transfer: Support for multiple files Gzip compression supported Now...
  16. Dep

    Hacking Hack WiFi Password Using MITM Method

    Follow These Steps For Hack WiFi Password Using MITM Method:- 1. Goto: https://github.com/wi-fi-analyzer/fluxion 2. After Downloading fluxion. Goto Downloads and extract Fluxion 3. Goto extracted directory where fluxion.sh is located and Run ./fluxion.sh Note- If all required files are updated...
Top Bottom