Monday, June 1, 2020

Phishing

Home Phishing
Malware

What are the Types of Malware Infecting Your Computer

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without...
Phishing Attacks

These Three Tips Can Help you to Protect from Phishing Attacks

The most dangerous part of a phishing attack is the belief that it can’t happen to you. Getting...
Anti-Phishing Tools

Cloud-Based Anti-Phishing Tools Can Help Prevent Phishing Attempts By Cybercriminals

Phishing has, is, and will always remain a threat. The most advanced cloud-based anti-phishing tools are there to...

Must Need

Chaos

CHAOS : PoC that Allow Generate Payloads & Control Remote OS

CHAOS is a PoC that allow generate payloads and control remote operating systems. Features
Htcap

Htcap-Web Application Scanner Able To Crawl Single Page Application

Htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and...
SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....
Kali Linux 2020.1 Release

Kali Linux 2020.1 Release

We are incredibly excited to announce the first release of 2020, Kali Linux 2020.1. It includes some exciting new updates:
Adidnsdump : Active Directory Integrated DNS Dump Tool

Adidnsdump : Active Directory Integrated DNS Dump Tool

Adidnsdump tool is an Active Directory Integrated DNS dumping by any authenticated user. By default any user in...
Telegra Csharp C2 : Command and Control for C# Writing

Telegra Csharp C2 : Command and Control for C# Writing

Telegra Csharp C2 is a tool for command and control for C# Writing. TelegramBotClient allows you to use a proxy for Bot...
Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find security-related misconfigurations...