Yearly Archives: 2022
IYPS
A password strength test tool that provides information on strength, anticipated crack times, warnings, and tips for creating stronger passwords.
Features:-
Completely open source
Fully offline...
MalSCCM
MalSCCM is a tool used to deploy malicious applications by abusing local or remote SCCM servers.
Attack Sequence:
Use locate to discover management server while...
Nivistealer
Steal photographs of the victim, their precise position on a device, and much more.
Features:-
Take victim's I.P.
Information about the stealth device
Battery and...
69phisher
Simple and user-friendly automated phishing page creator.
Phishing that is undetected by Chrome and uses the try.cloudflare tunnel.
An automated phishing tool for beginners with more...
Phishing Kits, Credential Theft, and Social Media Scam Trends Q1 2022
This year, phishing assaults have changed in unanticipated ways in addition to rising in volume. Phishing assaults are spread across several online platforms, according...
Crypto Scammers Turn to LinkedIn to Target Victims
Scams using cryptocurrencies have been reported by the FBI on LinkedIn. The fact that bitcoin frauds may target top executives makes them a serious...
Fake Voicemail Campaign Steals Microsoft 365 Credentials
Multiple American firms' Microsoft Office 365 and Outlook login credentials are the focus of a phishing effort. Attackers are utilising phoney voicemail notifications with...
Fzshell:– Fuzzy shell completions you didn’t know you needed
A fuzzy command line completer called fzshell retrieves completions from user-defined sources. Why does that matter? It implies that you may now design unique...
Noscrape
To make scraping your material more challenging, use Noscrape to obfuscate text using nodes.
The secret is to use any true-type font as noscrape creates...
Ransomware attacks rise but reseachers prove hackers aren’t all genuises
Ransomware assaults have been the misery of corporate IT administrators and their CEOs for more than 20 years, and they are a major area...