Merry Christmas and a Happy new year
Happy new year! Thanks to supporters like you, 2015 was a very successful start or us. We were able to exceed our goals and expand our services to the needy because of the generosity and commitment of...
View Articlecrash anyone’s whatsapp using smileys
Bhuyan is the same researcher who reported a very popular WhatsApp crash bug last year that required 2000 words (2kb in size) message in the special character set to remotely crash Whatsapp messenger...
View ArticleHello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing! [...] Read more
View ArticleHost Discovery and Port Scanning: Host Scanner
Host ScannerThe purpose of this project is to discover hosts on a network and gather information about them for later analysis.FeaturesTCP scannerA high-performance TCP scanner which initiates the...
View ArticleWPS – Cracking
This is experimental tool that is capable of attacking multiple WPS enabled wireless access points in real time.penetrator wpsThis is experimental tool that is capable of attacking multiple WPS-enabled...
View ArticlePhpSploit- Remote control framework
PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access...
View Article2000 Deep Web / Dark Web links 2016
WARNING!On the Deep Web you can find sites that sell stolen credit cards, teams that will clone credit cards through ATM’s, people selling cocaine, people selling Macbooks stolen from Apple stores, and...
View ArticleFree Pinterest Bot!
Follow pinterest users (pinners) automatically based on your keywords with this software!Some features Pinterest Bot : – Follow pinterest users automatically with your custom keywords – Socket based...
View ArticleHow to access the Dark Web or Deep Web
What is the Dark Web or Deep WebYou may have heard that there is some mysterious hidden internet called the ‘Deep Web’ or the ‘DarkNet’ that you can’t get to from Google.“Deep web” is distinct from...
View ArticleCreate a Rogue Wifi Access Point
Framework for Rogue Wi-Fi Access Point AttackWiFi-Pumpkin is a security tool that provide’s the Rogue access point to Man-In-The-Middle and network attacks. purporting to provide wireless Internet...
View ArticleVulnerability in Trend Micro Password Manager! Update ASAP
Vulnerability Trend MicroWhen you install TrendMicro Antivirus on Windows, by default a component called Password Manager is also installed and automatically launched on startup....
View ArticleDefault Root Password and Remote Enrollment on FingerTec Devices
Almost all FingerTec Access Control devices are running with open telnet, with a hardcoded default root password. Additionally, it is trivial to enroll a new administrative user on the device with a...
View ArticleMore than 10 Million Passwords free download 2016
The Passwords directory will hold a number of password lists that can be used by multiple tools when attempting to guess credentials for a given targetted service.This will include a number of very...
View ArticleHow to install Kali Linux NetHunter on your Nexus device
The Kali Linux NetHunter project is the first Open Source Android penetration testing platform for Nexus devices, created as a joint effort between the Kali community member “BinkyBear” and Offensive...
View ArticleVICTORY! The decision is in favor of Assange.
As a result of the legal action against WikiLeaks founder Julian Assange by both British and Swedish Governments, he has been arbitrarily detained by the United Kingdom and Sweden since his arrest in...
View Article