Sherlock – Find Usernames Across Social Networks

Find user name across 140+ social network. Requirment install python3 and python3-pip if not exist How to install # clone the repo $ git clone https://github.com/sherlock-project/sherlock.git # change...

Samsung Fake Apps on Google Play

Google Play is an Android app download download that all Android users use, but this service is not 100% reliable because there are a...

Firefox Let HTML File Steal Other Files From Device

Firefox is one of the most used web browsers in the world. This browser is one of the favorites for users who seek extra...

India’s First Processor Shakti is ready for app development

Shakti is processor developed by India. The Indian Institute of Technology in Madras has has released the software development kit (SDK) for its open-source...

The hidden side of Google reCAPTCHA v3

For the first time in the history of the CAPTCHAS the need disappears that the user has to introduce an illegible text in a...

Top 10 Browser Extensions for OSINT Researchers

For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for...

Dex to Java Decompiler : JADX

jadx - Dex to Java decompiler Command line and GUI tools for produce Java source code from Android Dex and Apk files. Android application package...

Be careful if you play EA games

The main developers of video games nowadays have platforms that allow users to browse their entire library, buy and download games and also be...

How to find breached Email : Whatbreach

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a list of emails...

A critical error puts the safety of the TP-Link network extenders at risk

In this article we echo an important failure that affects the TP-Link network extenders. In case an attacker manages to use this vulnerability he...

Latest news