Top Crypto Currency Mining MotherBoards and Hardwares for 2018

6 years ago

Crypto Currency Mining Mother Boards There are tons boards which are said to be highly efficient in mining that are…

CVE-2017-11882 POC, Exploit Released – Skeleton in the Closet

6 years ago

A 17 year old Vulnerability in Microsoft Word was disclosed recently tracked by CVE-2017-11882 which affected the major versions of…

OWASP Top 10 2017 Security Threats Explained – PDF Download

6 years ago

What is OWASP? OWASP or Open Web Application Security Project is an unbiased open source community focusing on improving the security…

TrevorC2 – Command and Control Over Browsable Webpage

7 years ago

Information Security Consulting company TrustedSec has announced a HTTP(s) command and control (C2) Open Source Framework dubbed TrevorC2. This is…

KRACK WPA – WPA has been Cracked – POC

7 years ago

WiFi and WPA Now a days, every offices, houses, hotels, parks, hospitals, almost everywhere there is wifi. But the real…

BLEAH – Bluetooth Low Energy Attack Tool

7 years ago

A new tool - BLEAH which is used for attacking Bluetooth Low Energy devices is now available for download in…

Kali Linux 2017.2 Features, Download and Upgrade

7 years ago

Kali Linux has been one of the best penetration testing OS of all time. During April 2017, Kali Linux 2017.1 rolling…

IntRec Pack – Easily Install Hacking tools in Kali Linux

7 years ago

We spend a lot of time going through sites, trying to find out the latest stable download link for various…

Ultra Long Range WiFi Receiver at Home

7 years ago

Interested in WiFi? In this post, I will explain how I made a WiFi station that can give you access…

Protego Project – CIA Missile Control System – WikiLeaks Vault7

7 years ago

Moments ago, wikileaks revealed four highly confidential documents (along with 37 related documents) of a top secret project of CIA…