A Look Back At 2015 – Tools & News Highlights


So here we are in 2016, yet still writing 2015 in our chequebooks (yah lolpls like anyone uses cheques any more). Following on from last year and our 2014 summary, here is our 2015 highlights post with interesting happenings over the past 12 months – including tools and news stories.

A Look Back At 2015 – Tools & News Highlights

2015 News Stories

The theme for 2015 seemed to be LARGE SCALE OWNAGE, everything and everyone was getting hacked left right and center. Right at the start of the year we already had the GHOST vulnerability and a Flash zero day in the wild – which left us happy to say goodbye to Flash on Facebook towards the end of the year (After their record breaking patch which contained 78 CVE-classified Vulnerabilities).

One of the big dramas of the year was Hacking Team getting Hacked – oh the irony. Other notable stuff would be the vulnerabilities in Jeep cars, the WhatsApp Web vCard Vulnerability, and the Hilary Clinton e-mail leak.

It was also the year of mega DDoS attacks with Telegram suffering a HUGE 200GBps pounding mid-year, then the prolonged, sustained and rather sophisticated DDoS on the crypto-mail service ProtonMail and to finish the year (and the one that affected me) the multi-day mega DDoS Seige on Linode over xmas and new years (thanks for wrecking many people’s holidays).

Other interesting stuff would be the Dell backdoor root cert fiasco, the TalkTalk hack which they tried to initially downplay and cover up, Logjam (which was a very interesting attack vector based on the the forward secrecy implementation).

2015 Best Hacking Tools

There’s been some pretty neat stuff released this year, the below are tools that’s I’ve personally found interesting but haven’t been super high traffic:

You may have overlooked some of these, so do check them out if you did!

You’ve probably already seen those below in the most viewed list, but well if you haven’t check out the below for the hottest tools in 2015.

Bonus – Top 10 Most Viewed Posts From 2015

  1. Infernal Twin – Automatic Wifi Hacking Tool
  2. EvilFOCA – Network Attack Toolkit
  3. FruityWifi – Wireless Network Auditing Tool
  4. Windows Credentials Editor (WCE) – List, Add & Change Logon Sessions
  5. Hacking Team Hacked – What You Need To Know
  6. Gcat – Python Backdoor Using Gmail For Command & Control
  7. Zarp – Network Attack Tool
  8. ATM Hacked Using Samsung Galaxy S4 & USB Port
  9. Parrot Security OS – Debian Based Security Oriented Operating System
  10. WinRAR Vulnerability Is Complete Bullshit

Enjoy 2016!

Posted in: Site News


Latest Posts:


dSploit APK Download - Hacking & Security Toolkit For Android dSploit APK Download – Hacking & Security Toolkit For Android
dSploit APK Download is a Hacking & Security Toolkit For Android which can conduct network analysis and penetration testing activities.
Scallion - GPU Based Onion Hash Generator Scallion – GPU Based Onion Hash Generator
Scallion is a GPU-driven Onion Hash Generator written in C#, it lets you create vanity GPG keys and .onion addresses (for Tor's hidden services).
WiFi-Dumper - Dump WiFi Profiles and Cleartext Passwords WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords
WiFi-Dumper is an open-source Python-based tool to dump WiFi profiles and cleartext passwords of the connected access points on a Windows machine.
truffleHog - Search Git for High Entropy Strings with Commit History truffleHog – Search Git for High Entropy Strings with Commit History
truffleHog is a Python-based tool to search Git for high entropy strings, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.
AIEngine - AI-driven Network Intrusion Detection System AIEngine – AI-driven Network Intrusion Detection System
AIEngine is a next-generation interactive/programmable Python/Ruby/Java/Lua and Go AI-driven Network Intrusion Detection System engine with many capabilities.
Sooty - SOC Analyst All-In-One CLI Tool Sooty – SOC Analyst All-In-One CLI Tool
Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process.


Comments are closed.