A team of security experts has devised a rogue USB charging cable named USBHarpoon that can be used to compromise a…
Cybersecurity firm NCC Group has released an open source tool for penetration testers that allows carrying out DNS rebinding attacks.…
Trustwave developed Social Mapper an Open Source Tool that uses facial recognition to correlate social media profiles across different social…
It's funny, but it is true, the popular Kali Linux hacking distro is available for download on the official Microsoft…
Luca Bongiorni was working on a cheap and dedicated hardware that he could remotely control (i.e. over WiFi or BLE),…
Metasploit RFTransceiver extension implements the Hardware Bridge API that will allow organizations to test wireless devices operating outside 802.11 spec.…
Rapid7 released the Metasploit Vulnerable Services Emulator, a new tool that can be used by IT experts to emulate vulnerable…
The security expert Michele Orru from FortConsult has released an automated phishing toolkit dubbed 'PhishLulz' for penetration testing activities. The…
If you need to test your environment in a short period of time the WarBerry Pi is the right device…
A few days ago group of white hat hackers from RedTeam traveled to the Midwest to test the systems of…
This website uses cookies.