• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

A Look Back At 2015 – Tools & News Highlights

January 7, 2016

Views: 3,506

So here we are in 2016, yet still writing 2015 in our chequebooks (yah lolpls like anyone uses cheques any more). Following on from last year and our 2014 summary, here is our 2015 highlights post with interesting happenings over the past 12 months – including tools and news stories.

A Look Back At 2015 – Tools & News Highlights

2015 News Stories

The theme for 2015 seemed to be LARGE SCALE OWNAGE, everything and everyone was getting hacked left right and center. Right at the start of the year we already had the GHOST vulnerability and a Flash zero day in the wild – which left us happy to say goodbye to Flash on Facebook towards the end of the year (After their record breaking patch which contained 78 CVE-classified Vulnerabilities).

One of the big dramas of the year was Hacking Team getting Hacked – oh the irony. Other notable stuff would be the vulnerabilities in Jeep cars, the WhatsApp Web vCard Vulnerability, and the Hilary Clinton e-mail leak.

It was also the year of mega DDoS attacks with Telegram suffering a HUGE 200GBps pounding mid-year, then the prolonged, sustained and rather sophisticated DDoS on the crypto-mail service ProtonMail and to finish the year (and the one that affected me) the multi-day mega DDoS Seige on Linode over xmas and new years (thanks for wrecking many people’s holidays).

Other interesting stuff would be the Dell backdoor root cert fiasco, the TalkTalk hack which they tried to initially downplay and cover up, Logjam (which was a very interesting attack vector based on the the forward secrecy implementation).

2015 Best Hacking Tools

There’s been some pretty neat stuff released this year, the below are tools that’s I’ve personally found interesting but haven’t been super high traffic:

  • pwntools – CTF Framework & Exploit Development Library
  • Gitrob – Scan Github For Sensitive Files
  • EvilAP Defender – Detect Evil Twin Attacks
  • Plecost – WordPress Fingerprinting Tool
  • InstaRecon – Automated Subdomain Discovery Tool
  • Just-Metadata – Gathers & Analyse IP Address Metadata
  • Dharma – Generation-based Context-free Grammar Fuzzing Tool
  • peinjector – MITM PE File Injector
  • Scumblr by Netflix – Automatically Scan For Leaks
  • Pupy – Open-Source Remote Administration Tool AKA RAT

You may have overlooked some of these, so do check them out if you did!

You’ve probably already seen those below in the most viewed list, but well if you haven’t check out the below for the hottest tools in 2015.

Bonus – Top 10 Most Viewed Posts From 2015

  1. Infernal Twin – Automatic Wifi Hacking Tool
  2. EvilFOCA – Network Attack Toolkit
  3. FruityWifi – Wireless Network Auditing Tool
  4. Windows Credentials Editor (WCE) – List, Add & Change Logon Sessions
  5. Hacking Team Hacked – What You Need To Know
  6. Gcat – Python Backdoor Using Gmail For Command & Control
  7. Zarp – Network Attack Tool
  8. ATM Hacked Using Samsung Galaxy S4 & USB Port
  9. Parrot Security OS – Debian Based Security Oriented Operating System
  10. WinRAR Vulnerability Is Complete Bullshit

Enjoy 2016!

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • 0-Day Flash Vulnerability Exploited In The Wild
  • XRayC2 - Weaponizing AWS X-Ray for Covert Command…
  • Privacy Implications of Web 3.0 and Darknets
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Site News Tagged With: year in review



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,170

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,039

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,335

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,189

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,187

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,082

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,431,644)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,096)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,549)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,346)
  • Password List Download Best Word List – Most Common Passwords (934,662)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,384)
  • Hack Tools/Exploits (674,308)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,421)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy