HiddenEye is an amazing tool to perform many attacks on the victims’ accounts. It can be easily used as a keylogger, phishing tool, information gathering , etc. This tool is …
O Suyash
O Suyash
Este é Suyash da Índia. Um entusiasta da cibersegurança, youtuber, Blogueiro, Freelancer e pentester. Ele costuma escrever artigos para compartilhar seu conhecimento com o mundo.
-
-
RouterSploit is an amazing exploitation framework made specifically for embedded devices. Esta ferramenta pode ser usada pelo pentester para verificar a segurança de câmeras e roteadores. Destaques do RouterSploit: Coded in …
-
Sn1per is one of the most amazing pentest frameworks for automated vulnerability scanning. A ferramenta oferece duas versões diferentes. Um é a comunidade(livre) e outro profissional(pago). Sn1per Professional is Xero …
-
XSStrike literally makes XSS detection very simple! É uma ferramenta muito útil que se pode usar. O que é XSStrike? XSStrike is a cross-site scripting tool. It is provided with four handwritten …
-
Ferramentas do Linux
Rei Phisher – Kit de ferramentas de campanha de phishing | Tutorial Completo
por O SuyashWhat is King Phisher? King Phisher is an amazing tool to perform real-world phishing attacks. It has a flexible architecture which allows you to full control over emails + server …
-
Andrax is an amazing tool to convert your phone into a Linux device. It enables all Android and ARM devices with root access and storage to become a weapon for …
-
Empreiteiro da NASA DMI atingido por ransomware, criptografando 2,583 servidores e estações de trabalho! The operators of the DopplePaymer ransomware announced that they had infected the network of one of NASA’s IT contractors. …
-
Uma falha no VMware Cloud Director permite que hackers executem código remotamente e assumam o controle de nuvens privadas. O VMware Cloud Director é uma plataforma de entrega de serviços em nuvem usada principalmente para …
-
Apple has awarded a bug bounty hunter $100,000 for finding and reporting a critical security issue that could lead to the takeover of third-party user accounts. Researcher Bhavuk Jain discovered …
-
Hackers breached six Cisco servers through SaltStack Salt vulnerabilities! Cisco published an advisory saying that, on May 7, 2020, they’ve discovered the compromise of six of their salt-master servers, which …