Instantly Backup all your Social Media Images
Facebook and Instagram are largely utilized as digital photo archives where we store and reveal our images. Many users no longer bother with producing physical replicates of photos and maintaining...
View ArticleBlackshades 2.6.3 Source
Blackshades full source, coded in Visual Basics 6. Blackshades Remote Controller is a RAT (Remote Administration Application) which allows a user to control several clients from around the world. Long...
View ArticleSmart Windows App Blocker
Smart Windows App Blocker is the Free Tool to quickly Block or Unblock any Windows Application with just a click, created by SecurityXploded. It is ideal tool for administrators to block access to...
View ArticlePE-bear – version 0.2.5 Released
What it is? PE-bear is my new project. It’s a reversing tool for PE files. Objective: to deliver fast and flexible “first view” tool for malware analysts. Stable and capable to handle malformed PE...
View ArticleMalwarebytes Anti-Exploit BETA Released
Malwarebytes Anti-exploit is a new application made by the makers of the freeware anti-virus, Malwarebytes. Protects Internet Explorer, Firefox, Chrome, and Opera browsers Protects browser components,...
View ArticleOWASP Xenotix XSS Framework V4.5 BETA
OWASP Xenotix XSS Exploit Framework is an innovative Cross Site Scripting (XSS) weakness detection and exploitation framework. It gives Zero False Positive scan results along with its unique Triple...
View ArticleEncryptonclick – Encrypt your files easily and fast
In this information age, we have many of our information digitalilzed or online, this can cause many compilcations if someone has access to/malware on your computer. Making use of a secure encryption...
View ArticlePython tool compilation for security
If you’re associated with vulnerability research, reverse engineering or penetration testing, It is suggested to experiment with the Python programming language. It provides a number of useful...
View ArticleXSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation
Introduction When Web application Penetration Tester start to scan web site using vulnerability scanners it give him false positive vulnerabilities and that happen because a lot of scanners using the...
View ArticleTiny banker aka Tinba Source
Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware. Tinba is a combination of the words tiny and...
View ArticleHow to Frankenscript
Features Spoof/fake the mac address for both the WiFi adapter and virtual interface monX. Frankenscript is able to launch other scripts. Scripts must be placed in the HOME/FrankenScript2/Scripts...
View ArticleFibratus – tracing the Windows Kernel
Fibratus is a tool which is able to capture the most of the Windows kernel activity – process/thread creation and termination, file system I/O, registry, network activity, DLL loading/unloading and...
View ArticleTelsaCrypt Decryption Tool v1.0
TESLACRYPT DECRYPTION TOOL Talos has created a decryption program to help individuals whose data has been encrypted by the TeslaCrypt ransomware. TeslaCrypt is a rapidly growing ransomware strain that...
View ArticleoclHashcat+ Advanced GPU Hash Cracking Utility 0.15
OclHashcat+ is an advanced GPU hash cracking utility that includes the World’s fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses...
View ArticleSparty 0.1
Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize...
View ArticleMobius Forensic Toolkit
Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined...
View ArticleIP Proxy Scraper
This lightweight yet powerful application extracts IPs and ports from a list of specified websites. If you are in need of multiple proxies simply insert the desired website URLs and with a single click...
View ArticleTiny banker aka Tinba
Tiny banker malware, aka Tinba. Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware. Tinba is a...
View ArticleOWASP Xenotix XSS Framework V4.5 BETA
OWASP Xenotix XSS Exploit Framework is an innovative Cross Site Scripting (XSS) weakness detection and exploitation framework. It gives Zero False Positive scan results along with its unique Triple...
View ArticleEncryptonclick – Encrypt your files easily and fast
In this information age, we have many of our information digitalilzed or online, this can cause many compilcations if someone has access to/malware on your computer. Making use of a secure encryption...
View Article