Be Updated with

Archives: Jun-2016

    Home / 2016 / June

The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim[…]

DMitry (Deepmagic Information Gathering Tool) is a UNIX / (GNU) Linux command line application with the ability to gather as much information as possible about[…]

Shellter is found at the website and is a shellcode injector. I have been using the tool to demonstrate to customers how simple it[…]

MAC address spoofing is a technique for changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded[…]

If we are considering a social engineering attack against a target, we are probably going to need email addresses. By having the email addresses of[…]