1-Click iPhone and Android Exploits Target Tibetan Users via WhatsApp

A team of Canadian cybersecurity researchers has uncovered a sophisticated and targeted mobile hacking campaign that is targeting high-profile members of various Tibetan groups with one-click exploits for iOS and Android devices. Dubbed Poison Carp by University of Toronto’s Citizen Lab, the hacking group behind this campaign sent tailored malicious …

Read More »

ExtAnalysis – Browser Extension Analysis Framework

With ExtAnalysis you can : Download & Analyze Extensions From:Chrome Web StoreFirefox AddonsAnalyze Installed Extensions of:Google ChromeMozilla FirefoxOpera Browser (Coming Soon)Upload and Scan Extensions. Supported formats:.crx.xpi.zip Features of ExtAnalysis : View Basic Informations:Name, Author, Description and VersionManifest ViewerIn depth permission informationExtract Intels from files which include:URLs and domainsIPv6 and IPv4 …

Read More »

Octopus – An Automated Database Hacking Software with Database Dorks Hacking

Octopus An Automated Database Hacking SoftwareOriginal and Powerful Database Dorks Hacking Disclaimer Third Party Tools are Property of Respected Owners Document Breaking into the databases from the internet, uploading asap Octopus Vulnerabilities List Port ScanningWeb Parameter ScanningDatabase Dorks List Android Installation ./chmod u+x *./Termux_Installer.shperl octopus.pl after installation Linux Installation ./chmod …

Read More »

List of awesome penetration testing resources,

A collection of awesome penetration testing resources Online ResourcesPenetration Testing ResourcesExploit developmentSocial Engineering ResourcesLock Picking ResourcesToolsPenetration Testing DistributionsBasic Penetration Testing ToolsDocker for Penetration TestingVulnerability ScannersNetwork ToolsWireless Network ToolsSSL Analysis ToolsWeb exploitationHex EditorsCrackersWindows UtilsLinux UtilsDDoS ToolsSocial Engineering ToolsOSInt ToolsAnonymity ToolsReverse Engineering ToolsCTF ToolsBooksPenetration Testing BooksHackers Handbook SeriesDefensive DevelopmentNetwork Analysis BooksReverse Engineering …

Read More »