full screen background image

Archives post

Silent miner backdoored – Malware reverse

Today i found new backdoored hacking tool to play with. A new Silent Miner made to infect with remote access some ”hackers”....

TROMMEL – Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities

TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following...

Hashcat v4.0 – World’s Fastest and Most Advanced Password Recovery Utility

  hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over...

WiFi Exploitation with WifiPhisher

Hello friends! Today we are going demonstrate WIFI- Phishing attack by using very great tool “WIFIphisher”, please read its description...

Lynis 2.5.7 – Security Auditing Tool for Unix/Linux Systems

  We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis....