LATEST ARTICLES

usb killer

USB Killer 2.0 Released – Tool to System Deep Fry

Want to fry your friends system?. This article is for you. USB killer 2.0 prototype was developed on 2015, which can able to "fry" virtually any device has a USB port....
chrome 56

Chrome 56 -Moving Towards a More Secure Web

Google security blog's Emily Schechter announced users of the upcoming changes in Chrome. ome 56  “Beginning in January 2017 ( Chrome 56 ), we’ll mark HTTP sites that transmit passwords or credit...
Autorelay

Autorelay – A Tool Can Perform Automated SMB Relay Attack

Autorelay - Python script for the organization of the automated SMB relay attack on both the local and the remote devices. Automatically performs the SMB relay attack on a remote server and...
president website hacked

Official Website of Srilanka’s President Defaced by Sri Lankan Youth

The online hacktivists from Srilanka have hacked and defaced the official website of Srilankan President (www.president.gov.lk) The website of Srilankan President was hacked yesterday 25th August 2016 late evening. Srilankan Youth left a...
NoSQL Exploitation Framework

NoSQL Exploitation Framework – Tool of the Month

NoSQL Exploitation Framework - A Tool for Script kiddies to Learn NOSQL - SQLInjection NoSQL, which stands for Not Only SQL, is a common term for nonrelational databases. Among popular NoSQL databases...

Operation Ghoul : Attacks on Targeted Countries

ALready Kaspersky Lab warns that the industries and organization of the middle East   suffer from targeted attacks in march 2015.In june 2016, researchers have recorded a new wave of attacks,...
Hitler ransomware

No more encryption Hitler ransomware just deletes files

Ransomware is one of the most dreaded threats for Internet users and a profitable business for crooks. In the last months, we have seen a number of malware belonging to this...
Hack a Smartphone

How to Hack a Smartphone without Detection and Take Control

You must have learned a thing or two about how to hack someone’s Facebook account. You can use any hacking software, install it on the system, paste the ID of your...

Android.Slicer will shop for you – Trojan Alert

Android.Slicer - A Trojan will shop for you on Google PlayStore Dr.Web - the Russian based cyber security company researchers has uncovered a new Android Trojan. Which buys applications from google play...
SQL injection : Hands in action

SQL injection – Hands in Action Session

If your website or web application is vulnerable to SQL injection then hackers can play with your database. So be careful with your codes. Here, today let us think us as hackers and...