Big Iron Recon & Pwnage (BIRP) for Mainframe Released
May 31st, 2014 📅
BIRP, Big Iron Recon & Pwnage, is a tool that will assist in the security assessment of mainframe applications served
May 31st, 2014 📅
BIRP, Big Iron Recon & Pwnage, is a tool that will assist in the security assessment of mainframe applications served
May 31st, 2014 📅
Inception is a FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP-2 DMA. The tool can unlock (any
May 30th, 2014 📅
While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well
May 30th, 2014 📅
TrueCrypt, the popular and reputed open source file and disk encryption Software for Windows, OSX and Linux, has abruptly closed
May 28th, 2014 📅
Kali Linux is an open source Debian-based distribution for penetration testing and forensics that is maintained and funded by Offensive
May 27th, 2014 📅
Yan Zhu, a researcher at the Electronic Frontier Foundation (EFF) noticed that the blogs hosted on WordPress are sending user
May 27th, 2014 📅
YaCy is a free search engine that anyone can use to build a search portal for their intranet or to
May 27th, 2014 📅
This morning reports came out that cybercriminals have targeted a large number of users of Apple’s iCloud connected devices with
May 27th, 2014 📅
Microsoft ended its support for Windows XP officially more than a month ago on April 8, 2014. This made a
May 26th, 2014 📅
NTOMobile On-Demand combines static analysis security testing (SAST), NTOSpider’s dynamic application security testing (DAST) and expert pen testers to deliver
May 26th, 2014 📅
Moscrack is a PERL application designed to facilitate cracking WPA keys in parallel on a group of computers. This is
May 25th, 2014 📅
Recently, a vulnerability has been reported by an Egyptian security researcher ‘Ahmed Aboul-Ela‘, that allows him to delete any comment
May 24th, 2014 📅
According to Apple's security advisory, All of the 21 security flaws address the iOS browser vulnerabilities proliferating through the Safari’s
May 24th, 2014 📅
Security researcher, Jordan Jones claims and tweeted from his account that he already reported the critical flaw to eBay, along with
May 23rd, 2014 📅
Simple Network Management Protocol (SNMP) is a UDP-based protocol which is commonly known and often used to manage network devices.
May 23rd, 2014 📅
FBI already catching up the hackers who use Blackshades or RAT (Remote Access Tool,) more than 100 users of Blackshades
May 23rd, 2014 📅
w3af, is a Web Application Attack and Audit Framework. The w3af core and it’s plugins are fully written in python,
May 22nd, 2014 📅
According to a report from Dutch news organization De Telegraaf, the hackers purchased locked iPhone devices for $50 to $150
May 21st, 2014 📅
A Critical zero-day Internet Explorer vulnerability, which was discovered by Peter ‘corelanc0d3r’ Van Eeckhoutte in October 2013 just goes public
May 21st, 2014 📅
If you have an eBay Account then you should change your password immediately, because the World's biggest E-commerce company with 128
May 21st, 2014 📅
A recent Angler Exploit Campaign has been spotted by the Cisco researcher spiked since April 23, targeting Microsoft’s Silverlight by
May 21st, 2014 📅
Desenmascara.me is a tool yet in it’s early PoC stage but fully functional. The goal of this tool is to
May 21st, 2014 📅
Overview Liffy is a tool written in Python designed to exploit local file inclusion vulnerabilities using three different techniques that
May 21st, 2014 📅
the latest release of SET v6.0 codename “Rebellion” is available https://github.com/trustedsec/social-engineer-toolkit/. This version expands on many of the attack vectors
Comments