How to find breached Email : Whatbreach

WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a list of emails...

A critical error puts the safety of the TP-Link network extenders at risk

In this article we echo an important failure that affects the TP-Link network extenders. In case an attacker manages to use this vulnerability he...

BlackBox operating system

Introducing one of the best security penetration testing platforms in the name of BlackBox, suitable for security professionals for free, with our continuing hacking...

PhoneInfoGa: Reconnaissance tool for phone numbers

PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather standard information...

Whitewidow SQL Injection scanning tool

Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potentially...

2019 ZERO-DAY CRYPTOGRAPHY VULNERABILITY IN WINDOWS 10

Security specialists in web pages members of the so-called "Project Zero" of Google, in charge of detecting zero-day vulnerabilities, have revealed a new flaw...

File Password Recovery Tool : ZYDRA

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords....

Triada malware on Android phones before leaving the factories

Google researchers have confirmed, group of cybercriminals managed to install the Triada malware on Android smartphones before leaving the factories of some Chinese manufacturers. Triada...

Cisco RV130W Remote Stack Overflow

Cisco has fixed critical flow in wireless VPN and firewall routers. Cisco said that CVE-2019-1663, which has a CVSS score of 9.8, allows...

Exim 4.9.1 RCE vulnerability

Security researchers at Qualys has found remote code execution bug in older versions of mail transfer agent (MTA). Exim — a critical, open source...

Latest news