Censor Tracker is a Chromium and Mozilla Firefox add-on. It aids in bypassing censorship and detecting DPI-filtering.
Configurable proxy
Country-specific proxying
DPI-filtration detection
Get around censorship and limitations
Issues warnings about websites that share personal information with third parties.
Disclaimer: The intended use for the tool is strictly educational and...
Hacking Discord accounts and bypassing 2FA authentication is possible with the Discord Nitro QR Scam.
What is the mechanism behind it?
A hacker uses Python to run the QR Generator.py file.
The hacker sends a QR code to a user and instructs them to scan it with the Discord app on their phone.
The user scans the code with his or her mobile account (assuming the user is foolish, hehe).
The hacker gains access to the account of the user.
Disclaimer: The intended use for the...
The Christmas shopping season is approached, and so are the Magecart assailants. Surprisingly, these assailants have been more aggressive than ever before, with an...
Cybercriminals use the Telegram handle "Smokes Night" to spread the malicious infostealer Echelon, which steals crypto currency and other account credentials.
Researchers say hackers are...
This is a simple shell code encryptor.
To get against anti-virus software, create a basic shell code encryptor/decryptor/executor.
The goal is to create a.Net binary that...
Assessment, auditing, hardening, and forensics Readiness Tool for AWS Security Best Practices. It adheres to the CIS Amazon Web Services Foundations Benchmark requirements, as...
The Federal Bureau of Investigation (FBI) has issued a warning about a recent vulnerability in Zoho's ManageEngine Desktop Central software being exploited.
Malware operators are...
Microsoft issued a security advisory on two Active Directory vulnerabilities addressed in the November 2021 Patch updates on Monday, advising customers to apply the...
A source code analyzer designed to surface interesting features and other characteristics in order to answer the question, "What's in the code?" Using a...
Cybercriminals can use a privilege elevation weakness in the ImControllerService service in Lenovo laptops, including ThinkPad and Yoga models, to execute commands with admin...