The latest downloads which has been reported by the finest security experts.
IPGeoLocation allows you to retrieve detailed IP geolocation information via any Linux terminal. The tool uses the ip-api service and it provides multiple search parameters which allow you to get all the details you need. […]
The Twittor backdoor uses the Twitter social media network as its command and control server, the Twittor backdoor was crafted after the author got inspired by the Gcat backdoor which used the Gmail service as […]
Malware is evolving and the perfect example is the Gdog backdoor which uses Gmail as a command and control server. The developers behind Gdog say that they were inspired to create a working RAT which […]
We have made a collection of ransomware decryption tools in order to help you with getting your files back. The ransomware decryption tools which have been listed here, have been collected from various online sources. […]
You might be familiar with Kali Linux, but did you know that there is another pentesting operating system which is called “BlackArch Linux” ? Well, this pentest operating system contains 1400 hacking tools and is […]