Source Link Introduction The recent story about the 19-year-old hacker who took control of several…
Mobile Security
-
-
Source Link The state of stalkerware in 2021 (PDF) Main findings of 2021 Every…
-
Cyber AttacksCyber CrimeFeaturedHackingMalwareMobile SecurityPhishingSecurityVulnerability
Fullz House Phishing Attack Targets Boom! Mobile
by Benjaminby BenjaminFullz House Phishing Attack Cybercrime is a serious threat to our way of life.…
-
XRay is a software for recon, mapping and OSINT gathering from public networks. XRay…
-
Automated Vulnerability Scanner for XSS Written in Python3 Traxss is an automated framework to…
-
Security Tools
Dolos Cloak- For Network Penetration Testers To Automated 802.1x Bypass
by ethhackby ethhackDolos Cloak- Automated 802.1x Bypass Dolos Cloak is a python script designed to help…
-
PostShell – Post Exploitation Bind/Backconnect Shell PostShell is a post-exploitation shell that includes both…
-
FinDomain- Fastest And Cross-platform Subdomain Enumerator. Comparison It comparison gives you a idea why…
-
Security Tools
Burp Suite Extension – To Monitor And Keep Track of Tested Endpoints
by ethhackby ethhackBurp Scope Monitor Extension A Burp Suite Extension to monitor and keep track of…
-
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams. With limited…