• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Darknet Archives

This is a yearly archive of all Darknet posts since the beginning of the site, ordered by date.

2025 • 2024 • 2023 • 2022 • 2021 • 2020 • 2019 • 2018 • 2017 • 2016 • 2015 • 2014 • 2013 • 2012 • 2011 • 2010 • 2009 • 2008 • 2007 • 2006

2025
  • 26th November - Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like
  • 24th November - SmbCrawler – SMB Share Discovery and Secret-Hunting
  • 21st November - Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk
  • 19th November - Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting
  • 17th November - mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers
  • 12th November - Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events
  • 10th November - Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool
  • 7th November - Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit
  • 5th November - Red Teaming LLMs 2025 – Offensive Security Meets Generative AI
  • 3rd November - gitlab-runner-research – PoC for abusing self-hosted GitLab runners
  • 31st October - mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents
  • 29th October - Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
  • 27th October - Reaper – Unified Application Security Testing with AI Support
  • 24th October - NetExec – Network Execution Toolkit for Windows and Active Directory
  • 22nd October - Post-Quantum Cryptography in 2025 – Migration Paths, Early Movers and CISO/RedTeam Impact
  • 20th October - XRayC2 – Weaponizing AWS X-Ray for Covert Command and Control (C2)
  • 17th October - HoneyBee – Misconfigured App Generator for Red Team Validation
  • 15th October - Exploit-as-a-Service Resurgence in 2025 – Broker Models, Bundles & Subscription Access
  • 13th October - Autoswagger – Automated discovery and testing of OpenAPI & Swagger endpoints
  • 10th October - CloudConqueror – AWS CloudControl API Attack Surface Mapping and Persistence Tool
  • 8th October - LLM Black Markets in 2025 – Prompt Injection, Jailbreak Sales & Model Leaks
  • 6th October - IAMhounddog – Practical AWS IAM Relationship Mapping for Red Teams
  • 3rd October - RustRedOps – Rust Native Offensive Toolkit Collection for Red Teams
  • 1st October - Inside Dark Web Exploit Markets in 2025: Pricing, Access & Active Sellers
  • 29th September - AIPentestKit – AI-Augmented Red Team Toolkit for Recon, Fuzzing and Payload Generation
  • 26th September - SetupHijack – Installer and Updater Race Condition Proof of Concept for Local Escalation
  • 24th September - Ransomware Payments vs Rising Incident Counts in 2025 – What’s Changing in RaaS Economics
  • 22nd September - HexStrike AI – Multi-Agent LLM Orchestration for Automated Offensive Security
  • 15th September - thermoptic – Chrome-perfect HTTP Fingerprint Cloaking for Red Team Web Ops
  • 12th September - LLAMATOR – Red Team Framework for Testing LLM Security
  • 10th September - Dark Web Search Engines in 2025 – Rankings, Risks & Ethical Trade-offs
  • 8th September - asnip – ASN Reconnaissance via Domain and IP Mapping
  • 5th September - BlockEDRTraffic – EDR Evasive Lateral Movement Tool
  • 3rd September - Generative AI in Social Engineering & Phishing in 2025
  • 1st September - TagNabIt – AWS Cloud Resource Enumeration via Metadata Tags
  • 29th August - RedExt – Browser Extension-Based C2 Framework for Red Team Recon
  • 27th August - Cybersecurity Workforce Trends in 2025 – Skills Gap, Diversity and SOC Readiness
  • 25th August - AzureStrike – Offensive Toolkit for Attacking Azure Active Directory Environments
  • 22nd August - ChromeAlone – Chromium Browser C2 Implant for Red Team Operations
  • 20th August - Darknet Communications in 2025 – From IRC Forums to Telegram Crime Networks
  • 18th August - LostMyPassword – Dual Use Password Recovery and Credential Dumping Tool
  • 15th August - MailSniper – PowerShell Tool for Exchange Mailbox Search and Credential Discovery
  • 11th August - xsshunter-express – Self-Hosted Blind XSS Payload Capture and Analysis
  • 8th August - Veles – Google’s Open Source Secret Scanner for GCP Key Detection
  • 6th August - Ransomware-as-a-Service Economy – Trends, Targets & Takedowns
  • 4th August - PyRIT – AI-Powered Reconnaissance for Cloud Red Teaming
  • 1st August - BrainDamage – Payload Generator and Encrypted Shell Stager for Red Teams
  • 30th July - Leveraging OSINT from the Dark Web – A Practical How-To
  • 28th July - Argus – Ultimate Reconnaissance Toolkit for Offensive Recon Operations
  • 25th July - evilreplay – Real-Time Browser Session Hijack Without Cookie Theft
  • 23rd July - Fake E-commerce Platforms as Attack Vectors & Threats in 2025
  • 21st July - CredMaster – Anonymous AWS‑Backed Password Spraying Toolkit
  • 18th July - PsMapExec – PowerShell Command Mapping for Lateral Movement
  • 16th July - Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation
  • 14th July - TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More
  • 11th July - Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets
  • 9th July - Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends
  • 7th July - Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation
  • 4th July - Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit
  • 2nd July - Malvertising and TDS Cloaking Tactics Uncovered
  • 30th June - OnionC2 – Tor Powered Rust Command and Control Framework
  • 27th June - Sububy – A Modular Ruby Suite for Subdomain Enumeration
  • 25th June - Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
  • 23rd June - AutoPwnKey – AV Evasion via Simulated User Interaction
  • 20th June - GitPhish – OAuth Device Code Phishing for GitHub Repos, Secrets, and CI/CD
  • 18th June - Exploring Netstalking – Mapping the Hidden Corners of the Internet
  • 16th June - claws – GitHub Actions Workflow Linter for Secure CI/CD Pipelines
  • 13th June - Envilder – Secure AWS SSM CLI for Environment Variable Management
  • 11th June - Argusee and Agentic AI in Cybersecurity
  • 9th June - Monkey365 – PowerShell Security Scanner for Microsoft 365, Azure, and Entra ID
  • 6th June - ProxyBlob – SOCKS5 Over Azure Blob Storage for Covert Network Tunneling
  • 4th June - Weaponizing Dependabot – Exploiting GitHub Automation for Supply Chain Attacks
  • 2nd June - OSSEC – Open Source Host-Based Intrusion Detection for Linux, Windows and Unix Systems
  • 28th May - Uber’s Secret Management Platform – Scaling Secrets Security Across Multi-Cloud
  • 26th May - AIDE – Lightweight Linux Host Intrusion Detection
  • 23rd May - Doppler CLI – Streamlined Secrets Management for DevOps
  • 21st May - AI-Powered Malware – The Next Evolution in Cyber Threats
  • 19th May - Falco – Real-Time Threat Detection for Linux and Containers
  • 16th May - Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance
  • 14th May - Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)
  • 12th May - SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths
  • 9th May - Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation
  • 7th May - AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race
  • 5th May - Upload_Bypass – Bypass Upload Restrictions During Penetration Testing
  • 2nd May - Shell3r – Powerful Shellcode Obfuscator for Offensive Security
  • 30th April - Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)
  • 28th April - DataSurgeon – Fast, Flexible Data Extraction and Transformation Tool for Linux
  • 25th April - Tyton – Kernel-Mode Rootkit Hunter for Linux
  • 23rd April - Cybersecurity in 2025- Real-World Threats and Lessons Learned
  • 21st April - Elkeid – A Modern, Scalable HIDS for Cloud-Native Infrastructure
  • 18th April - Nebula – Autonomous AI Pentesting Tool
  • 16th April - Super Bowl 2025 – Behind the Scenes of the Cybersecurity Blitz
  • 14th April - PentestGPT – AI-Powered Penetration Testing Assistant
2024
  • 5th January - Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool
2023
  • 31st August - AgentSmith HIDS – Host Based Intrusion Detection
  • 28th May - padre – Padding Oracle Attack Exploiter Tool
  • 31st March - Privacy Implications of Web 3.0 and Darknets
  • 21st March - DataSurgeon – Extract Sensitive Information (PII) From Logs
  • 12th February - Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap
2022
  • 29th December - HardCIDR – Network CIDR and Range Discovery Tool
  • 30th April - Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
  • 24th January - CFRipper – CloudFormation Security Scanning & Audit Tool
  • 5th January - CredNinja – Test Credential Validity of Dumped Credentials or Hashes
2021
  • 30th December - assetfinder – Find Related Domains and Subdomains
  • 31st August - Karkinos – Beginner Friendly Penetration Testing Tool
  • 7th July - Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
  • 27th May - Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
  • 7th May - LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
  • 19th April - Grype – Vulnerability Scanner For Container Images & Filesystems
  • 5th March - APT-Hunter – Threat Hunting Tool via Windows Event Log
  • 3rd February - GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
  • 1st January - GKE Auditor – Detect Google Kubernetes Engine Misconfigurations
2020
  • 7th December - zANTI – Android Wireless Hacking Tool Free Download
  • 6th November - HELK – Open Source Threat Hunting Platform
  • 3rd November - Trape – OSINT Analysis Tool For People Tracking
  • 22nd October - Fuzzilli – JavaScript Engine Fuzzing Library
  • 13th October - OWASP APICheck – HTTP API DevSecOps Toolset
  • 7th October - trident – Automated Password Spraying Tool
  • 24th September - tko-subs – Detect & Takeover Subdomains With Dead DNS Records
  • 17th August - Arcane – Tool To Backdoor iOS Packages (iPhone ARM)
  • 27th July - SharpHose – Asynchronous Password Spraying Tool
  • 7th July - Axiom – Pen-Testing Server For Collecting Bug Bounties
  • 28th May - Quasar RAT – Windows Remote Administration Tool
  • 19th May - Pingcastle – Active Directory Security Assessment Tool
  • 30th April - Second Order – Subdomain Takeover Scanner Tool
  • 15th April - Binwalk – Firmware Security Analysis & Extraction Tool
  • 31st March - zBang – Privileged Account Threat Detection Tool
  • 29th March - Memhunter – Automated Memory Resident Malware Detection
  • 24th March - Sandcastle – AWS S3 Bucket Enumeration Tool
  • 27th February - Astra – API Automated Security Testing For REST
  • 19th February - Judas DNS – Nameserver DNS Poisoning Attack Tool
  • 14th February - dsniff Download – Tools for Network Auditing & Password Sniffing
  • 10th February - OWASP Amass – DNS Enumeration, Attack Surface Mapping & External Asset Discovery
  • 29th January - Cameradar – Hack RTSP Video Surveillance CCTV Cameras
  • 15th January - dSploit APK Download – Hacking & Security Toolkit For Android
  • 10th January - Scallion – GPU Based Onion Hash Generator
2019
  • 19th December - WiFi-Dumper – Dump WiFi Profiles and Cleartext Passwords
  • 2nd December - truffleHog – Search Git for High Entropy Strings with Commit History
  • 25th November - AIEngine – AI-driven Network Intrusion Detection System
  • 1st November - Sooty – SOC Analyst All-In-One CLI Tool
  • 24th October - UBoat – Proof Of Concept PoC HTTP Botnet Project
  • 7th October - LambdaGuard – AWS Lambda Serverless Security Scanner
  • 23rd September - exe2powershell – Convert EXE to BAT Files
  • 7th September - HiddenWall – Create Hidden Kernel Modules
  • 31st August - Anteater – CI/CD Security Gate Check Framework
  • 28th August - Stardox – Github Stargazers Information Gathering Tool
  • 23rd August - ZigDiggity – ZigBee Hacking Toolkit
  • 27th July - RandIP – Network Mapper To Find Servers
  • 18th July - Nipe – Make Tor Default Gateway For Network
  • 11th July - Mosca – Manual Static Analysis Tool To Find Bugs
  • 1st July - Slurp – Amazon AWS S3 Bucket Enumerator
  • 27th June - US Government Cyber Security Still Inadequate
  • 24th June - BloodHound – Hacking Active Directory Trust Relationships
  • 30th April - SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
  • 5th March - DeepSound – Audio Steganography Tool
  • 27th February - What are the MOST Critical Web Vulnerabilities in 2019?
  • 25th February - GoBuster – Directory/File & DNS Busting Tool in Go
  • 4th February - BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
  • 20th January - Domained – Multi Tool Subdomain Enumeration
2018
  • 20th December - Acunetix Vulnerability Scanner For Linux Now Available
  • 17th December - Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
  • 29th November - Malcom – Malware Communication Analyzer
  • 23rd November - WepAttack – WLAN 802.11 WEP Key Hacking Tool
  • 14th November - Eraser – Windows Secure Erase Hard Drive Wiper
  • 2nd November - Web Security Stats Show XSS & Outdated Software Are Major Problems
  • 29th October - CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
  • 20th October - testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
  • 17th October - Four Year Old libssh Bug Leaves Servers Wide Open
  • 15th October - CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
  • 11th October - How To Recover When Your Website Got Hacked
  • 8th October - HTTrack – Website Downloader Copier & Site Ripper Download
  • 4th October - sshLooter – Script To Steal SSH Passwords
  • 30th August - Intercepter-NG – Android App For Hacking
  • 20th August - dcipher – Online Hash Cracking Using Rainbow & Lookup Tables
  • 12th August - HTTP Security Considerations – An Introduction To HTTP Basics
  • 6th August - Cangibrina – Admin Dashboard Finder Tool
  • 31st July - Enumall – Subdomain Discovery Using Recon-ng & AltDNS
  • 21st July - RidRelay – SMB Relay Attack For Username Enumeration
  • 8th July - NetBScanner – NetBIOS Network Scanner
  • 27th June - Metta – Information Security Adversarial Simulation Tool
  • 24th June - Powershell-RAT – Gmail Exfiltration RAT
  • 20th June - SCADA Hacking – Industrial Systems Woefully Insecure
  • 18th June - airgeddon – Wireless Security Auditing Script
  • 23rd May - Acunetix v12 – More Comprehensive More Accurate & 2x Faster
  • 19th May - CloudFrunt – Identify Misconfigured CloudFront Domains
  • 10th May - Airbash – Fully Automated WPA PSK Handshake Capture Script
  • 5th May - XXEinjector – Automatic XXE Injection Tool For Exploitation
  • 4th May - Yahoo! Fined 35 Million USD For Late Disclosure Of Hack
  • 1st May - Drupwn – Drupal Enumeration Tool & Security Scanner
  • 29th April - MyEtherWallet DNS Hack Causes 17 Million USD User Loss
  • 24th April - StaCoAn – Mobile App Static Analysis Tool
  • 17th April - snallygaster – Scan For Secret Files On HTTP Servers
  • 7th April - Portspoof – Spoof All Ports Open & Emulate Valid Services
  • 25th March - Cambridge Analytica Facebook Data Scandal
  • 19th March - GetAltName – Discover Sub-Domains From SSL Certificates
  • 13th March - Memcrashed – Memcached DDoS Exploit Tool
  • 11th March - QualysGuard – Vulnerability Management Tool
  • 8th March - Memcached DDoS Attacks Will Be BIG In 2018
  • 6th March - libsodium – Easy-to-use Software Library For Encryption
  • 3rd March - XSStrike – Advanced XSS Fuzzer & Exploitation Suite
  • 1st March - Bitdefender Releases FREE GandCrab Ransomware Decryption Tool
  • 27th February - Quickjack – Advanced Clickjacking & Frame Slicing Attack Tool
  • 12th February - BootStomp – Find Android Bootloader Vulnerabilities
  • 10th February - Google Chrome Marking ALL Non-HTTPS Sites Insecure July 2018
  • 7th February - altdns – Subdomain Recon Tool With Permutation Generation
  • 3rd February - 0-Day Flash Vulnerability Exploited In The Wild
  • 1st February - dorkbot – Command-Line Tool For Google Dorking
  • 24th January - USBPcap – USB Packet Capture For Windows
  • 16th January - OWASP ZSC – Obfuscated Code Generator Tool
  • 14th January - A Look Back At 2017 – Tools & News Highlights
  • 11th January - Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
  • 3rd January - Hijacker – Reaver For Android Wifi Hacker App
2017
  • 30th December - Sublist3r – Fast Python Subdomain Enumeration Tool
  • 20th December - coWPAtty Download – Audit Pre-shared WPA Keys
  • 15th December - net-creds – Sniff Passwords From Interface or PCAP File
  • 9th December - DAST vs SAST – Dynamic Application Security Testing vs Static
  • 5th December - Cr3dOv3r – Credential Reuse Attack Tool
  • 29th November - Mr.SIP – SIP Attack And Audit Tool
  • 23rd November - Uber Paid Hackers To Hide 57 Million User Data Breach
  • 21st November - RDPY – RDP Security Tool For Hacking Remote Desktop Protocol
  • 18th November - Terabytes Of US Military Social Media Spying S3 Data Exposed
  • 15th November - SNIFFlab – Create Your Own MITM Test Environment
  • 10th November - Skype Log Viewer Download – View Logs on Windows
  • 9th November - Ethereum Parity Bug Destroys Over $250 Million In Tokens
  • 7th November - WPSeku – Black-Box Remote WordPress Security Scanner
  • 4th November - Malaysia Telco Hack – Corporations Spill 46 Million Records
  • 1st November - WAFNinja – Web Application Firewall Attack Tool – WAF Bypass
  • 28th October - dirsearch – Website Directory Scanner For Files & Structure
  • 26th October - XXE Injection Attacks – XML External Entity Vulnerability With Examples
  • 23rd October - SQLiv – SQL Injection Dork Scanning Tool
  • 20th October - OSSIM Download – Open Source SIEM Tools & Software
  • 20th October - What You Need To Know About KRACK WPA2 Wi-Fi Attack
  • 18th October - Spaghetti Download – Web Application Security Scanner
  • 12th October - Taringa Hack – 27 Million User Records Leaked
  • 9th October - A2SV – Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed
  • 8th October - VHostScan – Virtual Host Scanner With Alias & Catch-All Detection
  • 6th October - Equifax Hack Blamed On Single Employee
  • 4th October - LOIC Download – Low Orbit Ion Cannon DDoS Booter
  • 1st October - Yuki Chan – Automated Penetration Testing Tool
  • 29th September - Deloitte Hacked – Client Emails, Usernames & Passwords Leaked
  • 26th September - Rapid7 Nexpose Community Edition – Free Vulnerability Scanner
  • 22nd September - BSQLinjector – Blind SQL Injection Tool Download in Ruby
  • 21st September - CCleaner Hack – Spreading Malware To Specific Tech Companies
  • 19th September - AWSBucketDump – AWS S3 Security Scanning Tool
  • 18th September - nbtscan Download – NetBIOS Scanner For Windows & Linux
  • 15th September - Equifax Data Breach – Hack Due To Missed Apache Patch
  • 12th September - Seth – RDP Man In The Middle Attack Tool
  • 9th September - dcrawl – Web Crawler For Unique Domains
  • 7th September - Time Warner Hacked – AWS Config Exposes 4M Subscribers
  • 5th September - Wikto Scanner Download – Web Server Security Tool
  • 1st September - Reaver Download – Hack WPS Pin WiFi Networks
  • 31st August - Instagram Leak From API Spills High Profile User Info
  • 30th August - GitMiner – Advanced Tool For Mining Github
  • 26th August - FIR (Fast Incident Response) – Cyber Security Incident Management Platform
  • 24th August - Bitcoin Anonymity Compromised By Most Vendors
  • 22nd August - NoSQLMap – Automated NoSQL MongoDB Exploitation Tool
  • 19th August - UACMe – Defeat Windows User Account Control (UAC)
  • 17th August - What You Need To Know About Server Side Request Forgery (SSRF)
  • 15th August - SAML Raider – SAML2 Security Testing Burp Extension
  • 12th August - faker.js – Tool To Generate Fake Data For Testing
  • 12th August - Should US Border Cops Need a Warrant To Search Devices?
  • 8th August - jSQL – Automatic SQL Injection Tool In Java
  • 4th August - Jack – Drag & Drop Clickjacking Tool For PoCs
  • 2nd August - US Voting Machines Hacked At DEF CON – Every One
  • 31st July - CrackMapExec – Active Directory Post-Exploitation Tool
  • 29th July - EvilAbigail – Automated Evil Maid Attack For Linux
  • 27th July - All You Need To Know About Cross-Site Request Forgery (CSRF)
  • 24th July - CyberChef – Cyber Swiss Army Knife
  • 22nd July - Ghost Phisher – Phishing Attack Tool With GUI
  • 19th July - Another Week Another Mass Domain Hijacking
  • 17th July - Bluto – DNS Recon, Zone Transfer & Brute Forcer
  • 15th July - dork-cli – Command-line Google Dork Tool
  • 13th July - DJI Firmware Hacking Removes Drone Flight Restrictions
  • 10th July - T50 – The Fastest Mixed Packet Injector Tool
  • 7th July - PenTools – Penetration Testing Tools Bundle
  • 5th July - GnuPG Crypto Library libgcrypt Cracked Via Side-Channel
  • 4th July - OpenPuff – Professional Steganography Tool
  • 29th June - NotPetya Ransomeware Wreaking Havoc
  • 27th June - Winpayloads – Undetectable Windows Payload Generation
  • 24th June - TheFatRat – Massive Exploitation Tool
  • 21st June - South Korean Webhost Nayana Pays USD1 Million Ransom
  • 20th June - pyrasite – Inject Code Into Running Python Processes
  • 17th June - snitch – Information Gathering Tool Via Dorks
  • 15th June - Fake News As A Service (FNaaS?) – $400k To Rig An Election
  • 13th June - credmap – The Credential Mapper
  • 10th June - LazyDroid – Android Security Assessment Tool
  • 8th June - OneLogin Hack – Encrypted Data Compromised
  • 5th June - EtherApe – Graphical Network Monitor
  • 2nd June - maltrail – Malicious Traffic Detection System
  • 1st June - Windows XP Too Unstable To Spread WannaCry
  • 30th May - evilscan – Massive IP Port Scanner
  • 26th May - sheep-wolf – Exploit MD5 Collisions For Malware Detection
  • 24th May - Massive Acunetix Online Update Brings New Features & UI
  • 23rd May - Sn1per – Penetration Testing Automation Scanner
  • 20th May - Pybelt – The Hackers Tool Belt
  • 19th May - UK Schedule 7 – Man Charged For Not Sharing Password
  • 16th May - Github Dorks – Github Security Scanning Tool
  • 15th May - WannaCry Ransomware Foiled By Domain Killswitch
  • 8th May - scanless – A Public Port Scan Scraper
  • 6th May - PwnBin – Python Pastebin Search Tool
  • 3rd May - Intel Finally Patches Critical AMT Bug (Kinda)
  • 1st May - Ubertooth – Open Source Bluetooth Sniffer
  • 29th April - Hajime Botnet Reaches 300,000 Hosts With No Malicious Functions
  • 27th April - pemcracker – Tool For Cracking PEM Files
  • 23rd April - BEURK – Linux Userland Preload Rootkit
  • 20th April - Shadow Brokers Release Dangerous NSA Hacking Tools
  • 18th April - yarAnalyzer – Yara Rule Analyzer and Statistics Generator
  • 12th April - Prisoners Hack Prison From Inside Prison
  • 10th April - spectrology – Basic Audio Steganography Tool
  • 8th April - PowerMemory – Exploit Windows Credentials In Memory
  • 6th April - Microsoft Azure Web Application Firewall (WAF) Launched
  • 3rd April - HashData – A Command-line Hash Identifying Tool
  • 31st March - European Commission Pushing For Encryption Backdoors
  • 27th March - HashPump – Exploit Hash Length Extension Attack
  • 25th March - Kadimus – LFI Scanner & Exploitation Tool
  • 23rd March - LastPass Hacked – Leaking Passwords Via Chrome Extension
  • 20th March - SessionGopher – Session Extraction Tool
  • 17th March - Ubiquiti Wi-Fi Gear Hackable Via 1997 PHP Version
  • 13th March - Powerfuzzer – Automated Customizable Web Fuzzer
  • 11th March - Angry IP Scanner Download – Fast Network IP Scanner
  • 9th March - WikiLeaks Exposes Massive CIA Leak Including Hacking Tools
  • 6th March - mongoaudit – MongoDB Auditing & Pen-testing Tool
  • 1st March - Another MongoDB Hack Leaks Two Million Recordings Of Kids
  • 27th February - Termineter – Smart Meter Security Testing Framework
  • 24th February - ShellNoob – Shellcode Writing Toolkit
  • 22nd February - Visiting The States? Have Your Passwords Ready
  • 20th February - crackle – Crack Bluetooth Smart Encryption (BLE)
  • 17th February - ONIOFF – Onion URL Inspector
  • 15th February - Why Are Hackers Winning The Security Game?
  • 14th February - hashID – Identify Different Types of Hashes
  • 10th February - Stitch – Python Remote Administration Tool AKA RAT
  • 9th February - 160,000 Network Printers Hacked
  • 7th February - Abbrase – Abbreviated Passphrase Password Generator
  • 4th February - Webbies Toolkit – Web Recon & Enumeration Tools
  • 2nd February - Dark Web Paying Corporate Workers To Leak Info
  • 30th January - Barnyard2 – Dedicated Spooler for Snort Output
  • 28th January - OWASP VBScan – vBulletin Vulnerability Scanner
  • 26th January - China To Outlaw All Unapproved Darknet VPN Services
  • 24th January - dns2proxy – Offensive DNS server
  • 21st January - icmpsh – Simple ICMP Reverse Shell
  • 19th January - Free Manual Pen-Testing Tools
  • 17th January - ZGrab – Application Layer Scanner For ZMap
  • 14th January - p0wnedShell – PowerShell Runspace Post Exploitation Toolkit
  • 12th January - MongoDB Ransack – Over 33,000 Databases Hacked
  • 10th January - Fluxion – Automated EvilAP Attack Tool
  • 6th January - Exitmap – Tor Exit Relay Scanner
  • 2nd January - DAVScan – WebDAV Security Scanner
2016
  • 31st December - Wycheproof – Test Crypto Libraries Against Known Attacks
  • 29th December - Ending The Year With A 650Gbps DDoS Attack
  • 27th December - Ettercap – A Suite For Man-In-The-Middle Attacks
  • 25th December - Merry Christmas & A Happy New Year 2017
  • 24th December - DBShield – Go Based Database Firewall
  • 22nd December - Kiev Power Outage Linked To Cyber Attacks
  • 20th December - dnsteal – DNS Exfiltration Tool
  • 18th December - PowerShellArsenal – PowerShell For Reverse Engineering
  • 14th December - Microsoft Breaks Network Connectivity For Windows 8 & 10 Users
  • 13th December - Fern Wifi Cracker – Wireless Security Auditing Tool
  • 10th December - sslscan Download – Detect SSL Versions & Cipher Suites (Including TLS)
  • 8th December - Malware Writers Using Exclusion Lists To Linger
  • 5th December - Minion – Mozilla Security Testing Framework
  • 3rd December - HexorBase – Administer & Audit Multiple Database Servers
  • 1st December - UK Encryption Backdoor Law Passed Via Investigatory Powers Act
  • 29th November - Pulled Pork – Suricata & Snort Rule Management
  • 24th November - Acunetix Web Vulnerability Scanner v11 Released
  • 22nd November - PyExfil – Python Data Exfiltration Tools
  • 19th November - Androguard – Reverse Engineering & Malware Analysis For Android
  • 17th November - Android Devices Phoning Home To China
  • 14th November - Netdiscover – Network Address Discovery Tool
  • 10th November - Signal Messaging App Formal Audit Results Are Good
  • 8th November - Kautilya – Human Interface Device Hacking Toolkit
  • 5th November - Censys Search Engine – Public Host & Network Search
  • 3rd November - UK Teen Earned More Than US$385,000 From DDoS Service
  • 1st November - Snort – Free Network Intrusion Detection & Prevention System
  • 29th October - Advanced IP Scanner – Fast Lightweight Free Windows Port Scanner
  • 27th October - The Dyn DNS DDoS That Killed Half The Internet
  • 24th October - Infernal Twin Updated 2.6.11 – Automated Wireless Hacking Suite
  • 22nd October - Zenmap Download – Official Cross-Platform Nmap GUI
  • 20th October - SHA-256 and SHA3-256 Are Safe For the Foreseeable Future
  • 18th October - nishang – PowerShell For Penetration Testing
  • 15th October - DyMerge – Bruteforce Dictionary Merging Tool
  • 12th October - Securing MySQL Installation on Ubuntu 16.04 LTS
  • 10th October - mitmproxy – Intercepting HTTP Proxy Tool aka MITM
  • 7th October - Scirius – Suricata Ruleset Management Web Application
  • 5th October - Mirai Source Code for DDoS Malware Bonet Leaked
  • 4th October - Raptor WAF – C Based Web Application Firewall
  • 30th September - mimikittenz – Extract Plain-Text Passwords From Memory
  • 29th September - Massive Yahoo Hack – 500 Million Accounts Compromised
  • 26th September - Volatility Framework – Advanced Memory Forensics Framework
  • 24th September - OWASP OWTF – Offensive Web Testing Framework
  • 22nd September - Tesla Hack – Remote Access Whilst Parked or Driving
  • 20th September - MANA Toolkit – Rogue Access Point (evilAP) And MiTM Attack Tool
  • 17th September - BBQSQL – Blind SQL Injection Framework
  • 15th September - Two Israeli Men Arrested For Running VDoS-s.com DDoS Service
  • 13th September - PunkSPIDER – A Web Vulnerability Search Engine
  • 10th September - DET – Data Exfiltration Toolkit
  • 8th September - Linux kernel.org Hacker Arrested After Traffic Stop
  • 6th September - DBPwAudit – Database Password Auditing Tool
  • 1st September - Dropbox Hacked – 68 Million User Accounts Compromised
  • 30th August - Emerging Threats ETOpen – Anti-malware IDS/IPS Ruleset
  • 27th August - Bearded – Security Automation Platform
  • 25th August - An Introduction To Web Application Security Systems
  • 23rd August - IGHASHGPU – GPU Based Hash Cracking – SHA1, MD5 & MD4
  • 20th August - PowerOPS – PowerShell Runspace Portable Post Exploitation Tool
  • 18th August - Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
  • 16th August - UFONet – Open Redirect DDoS Tool
  • 13th August - Pompem – Exploit & Vulnerability Finder
  • 11th August - Bug Bounties Reaching $500,000 For iOS Exploits
  • 9th August - CuckooDroid – Automated Android Malware Analysis
  • 5th August - Telegram Hack – Possible Nation State Attack By Iran
  • 2nd August - miranda-upnp – Interactive UPnP Client
  • 29th July - fping 3 – Multi Target ICMP Ping Tool
  • 28th July - In 2016 Your Wireless Keyboard Security Still SUCKS – KeySniffer
  • 26th July - WOL-E – Wake On LAN Security Testing Suite
  • 23rd July - dnmap – Distributed Nmap Framework
  • 21st July - Everything You Need To Know About Web Shells
  • 18th July - DMitry – Deepmagic Information Gathering Tool
  • 12th July - Automater – IP & URL OSINT Tool For Analysis
  • 7th July - Android Malware Giving Phones a Hummer
  • 5th July - ERTS – Exploit Reliability Testing System
  • 28th June - OpenIOC – Sharing Threat Intelligence
  • 25th June - Up1 – Client Side Encrypted Image Host
  • 23rd June - Criminal Rings Hijacking Unused IPv4 Address Spaces
  • 21st June - shadow – Firefox Heap Exploitation Tool (jemalloc)
  • 18th June - Cuckoo Sandbox – Automated Malware Analysis System
  • 16th June - Intel Hidden Management Engine – x86 Security Risk?
  • 14th June - Fully Integrated Defense Operation (FIDO) – Automated Incident Response
  • 11th June - Unicorn – PowerShell Downgrade Attack
  • 9th June - Web Application Log Forensics After a Hack
  • 6th June - movfuscator – Compile Into ONLY mov Instructions
  • 2nd June - TeamViewer Hacked? It Certainly Looks Like It
  • 31st May - Wfuzz Download – Web Application Password Cracker
  • 27th May - wildpwn – UNIX Wildcard Attack Tool
  • 23rd May - CapTipper – Explore Malicious HTTP Traffic
  • 20th May - SubBrute – Subdomain Brute-forcing Tool
  • 16th May - The Backdoor Factory (BDF) – Patch Binaries With Shellcode
  • 13th May - Gdog – Python Windows Backdoor With Gmail Command & Control
  • 9th May - SPF (SpeedPhish Framework) – E-mail Phishing Toolkit
  • 7th May - WAFW00F – Fingerprint & Identify Web Application Firewall (WAF) Products
  • 5th May - Serious ImageMagick Zero-Day Vulnerabilities – ImageTragick?
  • 3rd May - MISP – Malware Information Sharing Platform
  • 30th April - PowerShell Empire Download – Post-Exploitation Hacking Tool
  • 28th April - BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records
  • 26th April - Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response
  • 23rd April - SamParser – Parse SAM Registry Hives With Python
  • 20th April - Apple Will Not Patch Windows QuickTime Vulnerabilities
  • 19th April - Recon-ng – Web Reconnaissance Framework
  • 16th April - IPGeoLocation – Retrieve IP Geolocation Information
  • 14th April - BADLOCK – Are ‘Branded’ Exploits Going Too Far?
  • 12th April - INURLBR – Advanced Search Engine Tool
  • 9th April - DNSRecon – DNS Enumeration Script
  • 7th April - The Panama Papers Leak – What You Need To Know
  • 5th April - Phishing Frenzy – E-mail Phishing Framework
  • 2nd April - Responder – LLMNR, MDNS and NBT-NS Poisoner
  • 29th March - TempRacer – Windows Privilege Escalation Tool
  • 25th March - PEiD Download – Detect PE Packers, Cryptors & Compilers
  • 23rd March - FBI Backed Off Apple In iPhone Cracking Case
  • 22nd March - NAXSI – Open-Source WAF For Nginx
  • 19th March - Frida – Dynamic Code Instrumentation Toolkit
  • 17th March - Defence In Depth For Web Applications
  • 15th March - BetterCap – Modular, Portable MiTM Framework
  • 11th March - Mac OS X Ransomware KeRanger Is Linux Encoder Trojan
  • 8th March - DIRB – Domain Brute-forcing Tool
  • 5th March - AuthMatrix for Burp Suite – Web Authorisation Testing Tool
  • 3rd March - DROWN Attack on TLS – Everything You Need To Know
  • 1st March - Cyborg Hawk Linux – Linux Hacking Distro
  • 27th February - Veil Framework – Antivirus Evasion Framework
  • 25th February - 13 WordPress Security Tips From Acunetix
  • 23rd February - Linset Download – Evil Twin Attack Hacking Tool
  • 19th February - The Linux glibc Exploit – What You Need To Know
  • 16th February - LNHG – Massive Web Fingerprinter (mwebfp)
  • 11th February - Darknet Moving Servers & Upgrades Etc
  • 9th February - YARA – Pattern Matching Tool For Malware Analysis
  • 6th February - Gophish – Open-Source Phishing Framework
  • 4th February - Malwarebytes Bug Bounty Program Goes Live
  • 2nd February - WAF-FLE – Graphical ModSecurity Console Dashboard
  • 30th January - hping3 – TCP/IP Packet Assembler & Analyser
  • 28th January - PayPal Remote Code Execution Vulnerability Patched
  • 26th January - RWMC – Retrieve Windows Credentials With PowerShell
  • 21st January - 123456 Still The Most Common Password For 2015
  • 19th January - MITMf – Man-In-The-Middle Attack Tool
  • 16th January - LOKI – Indicators Of Compromise Scanner
  • 14th January - Fortinet SSH Backdoor Found In Firewalls
  • 12th January - dnscat2 – DNS Tunnel Tool
  • 9th January - FastIR Collector – Windows Incident Response Tool
  • 7th January - A Look Back At 2015 – Tools & News Highlights
  • 5th January - Dradis – Reporting Platform For IT Security Professionals
2015
  • 31st December - Linode DDoS Attack – Merry Xmas Sysadmins
  • 29th December - LaZagne – Password Recovery Tool For Windows & Linux
  • 24th December - Facebook Disabled Flash For Video Finally
  • 22nd December - PowerSploit – A PowerShell Post-Exploitation Framework
  • 19th December - Integrit – File Verification System
  • 17th December - Critical Remote Root Zero-Day In FireEye Appliances
  • 15th December - Pupy Download – Open-Source Remote Administration Tool – RAT
  • 10th December - Latest Update Patches 78 CVE-classified Flash Security Vulnerabilities
  • 8th December - SprayWMI – PowerShell Injection Mass Spray Tool
  • 4th December - VTech Hack – Over 7 Million Records Leaked (Children & Parents)
  • 1st December - LSAT – Linux Security Auditing Tool
  • 28th November - Zarp – Network Attack Tool
  • 26th November - Dell Backdoor Root Cert – What You Need To Know
  • 24th November - Rekall – Memory Forensic Framework
  • 21st November - american fuzzy lop – Security Oriented Fuzzing Tool
  • 19th November - ISIS Running 24-Hour Terrorist Crypto Help-desk
  • 17th November - KeeFarce – Extract KeePass Passwords (2.x) From Database
  • 13th November - ModSecurity – Open Source Web Application Firewall
  • 12th November - ProtonMail DDoS Attack – Sustained & Sophisticated
  • 10th November - 0d1n – Web HTTP Fuzzing Tool
  • 6th November - SpiderFoot – Open Source Intelligence Automation Tool (OSINT)
  • 4th November - TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details
  • 2nd November - Scumblr by Netflix – Automatically Scan For Leaks
  • 30th October - DAMM – Differential Analysis of Malware in Memory
  • 29th October - FBI Recommends Crypto Ransomware Victims Just Pay
  • 27th October - Infernal Twin – Automatic Wifi Hacking Tool
  • 24th October - WP Security Audit Log – A Complete Audit Log Plugin For WordPress
  • 22nd October - Fitbit Vulnerability Means Your Tracker Could Spread Malware
  • 20th October - OWASP WebGoat Download – Deliberately Insecure Web Application
  • 17th October - windows-privesc-check – Windows Privilege Escalation Scanner
  • 15th October - More Drama About Hillary Clinton’s E-mail Leak – VNC & RDP Open
  • 13th October - Malheur – Automatic Malware Analysis Tool
  • 9th October - Twittor – Backdoor Using Twitter For Command & Control
  • 8th October - Amazon AWS Web Application Firewall (WAF ) Launched
  • 6th October - LiME – Linux Memory Extractor
  • 3rd October - HookME – API Based TCP Proxy Including SSL
  • 1st October - WinRAR Vulnerability Is Complete Bullshit
  • 29th September - FSFlow – A Social Engineering Call Flow Application
  • 27th September - EvilFOCA – Network Attack Toolkit
  • 24th September - XcodeGhost iOS Trojan Infected Over 4000 Apps
  • 22nd September - peinjector – MITM PE File Injector
  • 19th September - Weevely 3 – Weaponized PHP Web Shell
  • 17th September - Kid Arrested For Clock He Built – World Goes NUTS
  • 15th September - BackBox Linux Download – Penetration Testing LiveCD
  • 12th September - AIDE – Advanced Intrusion Detection Environment
  • 10th September - WhatsApp Web vCard Vulnerability Exposed 200M Users
  • 8th September - Gcat – Python Backdoor Using Gmail For Command & Control
  • 4th September - Microsoft Data Harvesting Backported To Windows 7 & 8
  • 31st August - Tiger – Unix Security Audit & Intrusion Detection Tool
  • 6th August - Windows 10 Privacy – Just Installed? Read This
  • 5th August - FruityWifi – Wireless Network Auditing Tool
  • 30th July - Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping
  • 28th July - Mimikatz Download – Gather Windows Credentials
  • 23rd July - The Jeep HACK – What You Need To Know
  • 21st July - Dharma – Generation-based Context-free Grammar Fuzzing Tool
  • 16th July - Telegram DDoS Attack – Messaging App Suffers 200GBps Pounding
  • 14th July - Egress-Assess – Test Network Egress Data Detection
  • 11th July - Passgen – WPA2 Password Generator
  • 9th July - Hacking Team Hacked – What You Need To Know
  • 4th July - AddressSanitizer – A Fast Memory Error Detector
  • 2nd July - Acunetix WVS 10 Released – Keeping Your Website Secure just got Easier
  • 30th June - WATOBO – The Web Application Security Auditing Toolbox
  • 28th June - BTCrawler – Bluetooth Diagnostic & Discovery Tool
  • 23rd June - unix-privesc-check – Unix/Linux User Privilege Escalation Scanner
  • 20th June - Parrot Security OS – Debian Based Security Oriented Operating System
  • 18th June - Apple’s Password Storing Keychain Cracked on iOS & OS X
  • 14th June - Just-Metadata – Gathers & Analyse IP Address Metadata
  • 11th June - Agile Security – How Does It Fit Into A World Of Continuous Delivery
  • 9th June - Patator – Multi-threaded Service & URL Brute Forcing Tool
  • 6th June - Shadow Daemon – Web Application Firewall
  • 4th June - OpenSSH On Windows – It’s Happening!
  • 31st May - OWASP Zed Attack Proxy – Integrated Penetration Testing Tool
  • 28th May - IRS Was Not Hacked – Taxpayer Data Stolen For 100,000 People
  • 26th May - zzuf – Multi-Purpose Application Input Fuzzing Tool
  • 22nd May - Web Security Dojo 2.0 – Self-Contained Web Hacking Training
  • 21st May - The Logjam Attack – ANOTHER Critical TLS Weakness
  • 16th May - Plecost – WordPress Fingerprinting Tool
  • 14th May - BitTorrent Bleep – Encrypted, Decentralized Voice & Text App
  • 12th May - InstaRecon – Automated Subdomain Discovery Tool
  • 9th May - Wapiti – Web Application Vulnerability Scanner v2.3.0
  • 8th May - Double For Your Money With Acunetix Vulnerability Scanner
  • 5th May - The Dude Network Software – Automatic Network Mapper
  • 2nd May - Graudit v1.9 Download – Grep Source Code Auditing Tool
  • 30th April - WordPress Critical Zero-Day Vulnerability Fixed In A Hurry
  • 28th April - CeWL v5.1 – Password Cracking Custom Word List Generator
  • 25th April - OAT – Microsoft OCS Assessment Tool (Office Communication Server)
  • 21st April - sptoolkit Rebirth – Simple Phishing Toolkit
  • 18th April - EvilAP Defender – Detect Evil Twin Attacks
  • 16th April - Google Chrome 42 Stomps A LOT Of Bugs & Disables Java By Default
  • 14th April - SamuraiWTF 3.x And Onwards – Web Testing Framework Linux LiveCD
  • 9th April - Security Vendor Trustwave Bought By Singtel For $810M
  • 7th April - Watcher – Passive Web Application Vulnerability Scanner
  • 4th April - Commix – Command Injection Attack Tool
  • 2nd April - Google Revoking Trust In CNNIC Issued Certificates
  • 31st March - Pentoo – Gentoo Based Penetration Testing Linux LiveCD
  • 28th March - Onapsis Bizploit v1.50 – SAP Penetration Testing Framework
  • 24th March - Yasca – Multi-Language Static Analysis Toolset
  • 21st March - XSSYA v2.0 Released – XSS Vulnerability Confirmation Tool
  • 19th March - Pinterest Bug Bounty Program Starts Paying
  • 14th March - wig – CMS Identification & Information Gathering Tool
  • 12th March - Rowhammer – DDR3 Exploit – What You Need To Know
  • 9th March - MessenPass – Recover MSN, Yahoo Messenger, ICQ, Trillian Passwords
  • 7th March - Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD
  • 5th March - Acunetix Clamps Down On Costly Website Security With Online Solution
  • 3rd March - Appie – Portable Android Security Testing Suite
  • 1st March - CMSmap – Content Management System Security Scanner
  • 26th February - Google Expands Pwnium Year Round With Infinite Bounty
  • 24th February - VScan – Open Source Vulnerability Management System
  • 17th February - Windows Credentials Editor (WCE) – List, Add & Change Logon Sessions
  • 12th February - Facebook Launches ThreatExchange – Security Clearinghouse API
  • 10th February - Droopescan – Plugin Based CMS Security Scanner
  • 5th February - Anthem Hacked – US Health Insurance Provider Leaks 70 Million Records
  • 3rd February - SnoopyPro – Windows USB Sniffer Tool
  • 30th January - GHOST Vulnerability In glibc – Everything You Need To Know
  • 26th January - OAT – Oracle Auditing Tools For Database Security
  • 22nd January - Flash Zero Day Being Exploited In The Wild
  • 20th January - Gitrob – Scan Github For Sensitive Files
  • 17th January - OpenVAS 7 Released – Open Source Vulnerability Scanner
  • 15th January - Google Leaves Android Users Vulnerable To WebView Exploit
  • 13th January - pwntools – CTF Framework & Exploit Development Library
  • 10th January - BlueScan – A Bluetooth Device Scanner
  • 8th January - ATM Hacked Using Samsung Galaxy S4 & USB Port
  • 6th January - A Look Back At 2014 – Tools & News Highlights
2014
  • 30th December - SniffPass – Simple Password Sniffer
  • 25th December - Rackspace Recovers From Major DNS DDoS
  • 19th December - Acunetix OVS Review (Online Vulnerability Scanner)
  • 18th December - ICANN Hacked Including Root DNS Systems
  • 16th December - BlueMaho Project – Bluetooth Security Testing Suite
  • 13th December - Oryon C Portable – Open Source Intelligence (OSINT) Framework
  • 11th December - Sony Digital Certs Being Used To Sign Malware
  • 9th December - InsomniaShell – ASP.NET Reverse Shell Or Bind Shell
  • 6th December - WhatWeb Download – Identify CMS, Blogging Platform, Stats Packages
  • 4th December - Sony Pictures Hacked – Employee Details & Movies Leaked
  • 2nd December - Gruyere – Learn Web Application Exploits & Defenses
  • 29th November - isowall – Completely Isolate A Device From The Local Network
  • 27th November - Bitcoin Not That Anonymous Afterall
  • 25th November - LinEnum – Linux Enumeration & Privilege Escalation Tool
  • 22nd November - Critical XSS Flaw Affects WordPress 3.9.2 And Earlier
  • 20th November - Sparty – MS Sharepoint and Frontpage Auditing Tool
  • 18th November - U.S. State Department Hacked
  • 15th November - Kali Linux – The Most Advanced Penetration Testing Linux Distribution
  • 13th November - Microsoft Schannel Vulnerabilty – Patch It NOW
  • 11th November - Radare – The Reverse Engineering Framework
  • 5th November - Brakeman – Static Analysis Rails Security Scanner
  • 3rd November - Facebook Allows Tor Access To Site
  • 31st October - ZMap – Fast Open-Source Network Scanner
  • 30th October - Serious Linux/UNIX FTP Flaw Allows Command Execution
  • 27th October - Arachni v1.0 Released – Web Application Security Scanner Framework
  • 25th October - Microsoft Zero Day OLE Vuln Being Exploited In Powerpoint
  • 23rd October - Pipal – Password Analyzer Tool
  • 21st October - Apple’s OS X Yosemite Spotlight Privacy Issues
  • 18th October - RIPS – Static Source Code Analysis For PHP Vulnerabilities
  • 16th October - Everything You Need To Know About POODLE SSLv3 Vulnerability
  • 14th October - ThreadFix – Vulnerability Aggregation & Management System
  • 10th October - Stupid E-mails – Satilight Hacking, Website Cloning, Detailo & More!
  • 8th October - IPFlood (was IPFuck) – Firefox Add-on To Hide Your IP
  • 6th October - JPMorgan Hacked & Leaked Over 83 Million Customer Records
  • 3rd October - iSniff-GPS – Passive Wifi Sniffing Tool With Location Data
  • 2nd October - OpenVPN Vulnerable To Shellshock Exploit
  • 29th September - masscan – Really Fast Network Scanner For TCP
  • 26th September - Everything You NEED To Know About Shellshock Bug In BASH
  • 24th September - drozer – The Leading Security Testing Framework For Android
  • 23rd September - CloudFlare Introduces SSL Without Private Key
  • 20th September - tinfoleak – Get Detailed Info About Any Twitter User
  • 18th September - Twitter Vulnerability Allows Deletion Of Payment Details
  • 16th September - StegExpose – Steganalysis Tool For Detecting Steganography In Images
  • 13th September - Google DID NOT Leak 5 Million E-mail Account Passwords
  • 11th September - Lynis v1.6.0 Released For Download – Linux Security Auditing Tool
  • 8th September - Twitter Bug Bounty Official – Started Paying For Bugs
  • 3rd September - BurpSentintel – Vulnerability Scanning Plugin For Burp Proxy
  • 2nd September - Massive Celeb Leak Brings iCloud Security Into Question
  • 29th August - IronWASP – Open Source Web Security Testing Platform
  • 27th August - Twitter Patents Technique To Detect Mobile Malware
  • 23rd August - Garmr – Automate Web Application Security Tests
  • 20th August - Heartbleed Implicated In US Hospital Leak
  • 18th August - Passera – Generate A Unique Strong Password For Every Website
  • 15th August - Hiding A Bitcoin Mining Botnet In The Cloud
  • 13th August - ParanoiDF – PDF Analysis & Password Cracking Tool
  • 11th August - XML Quadratic Blowup Attack Blows Up WordPress & Drupal
  • 6th August - HoneyDrive 3 Released – New Honeypot Download Distro ISO
  • 4th August - Windows Registry Infecting Malware Has NO Files
  • 30th July - XSSYA – Cross Site Scripting (XSS) Scanner Tool
  • 28th July - Microsoft China Offices Raided By Government
  • 25th July - Gauntlt – Security Testing Framework For Developers & Ops
  • 23rd July - Clear Your Cookies? You Can’t Escape Canvas Fingerprinting
  • 21st July - clipcaptcha – CAPTCHA Service Impersonation Tool
  • 18th July - Microsoft Says You SHOULD Re-use Passwords Across Sites
  • 16th July - FakeNet – Windows Network Simulation Tool For Malware Analysis
  • 14th July - Password Manager Security – LastPass, RoboForm Etc Are Not That Safe
  • 9th July - dirs3arch – HTTP File & Directory Brute Forcing Tool
  • 7th July - Hacking Your Fridge – Internet of Things Security
  • 4th July - ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
  • 2nd July - Microsoft’s Anti-Malware Action Cripples Dynamic DNS Service No-IP
  • 27th June - Dradis v2.9 – Information Sharing For Security Assessments
  • 25th June - Hackers Recreate NSA Snooping Kit Using Off-the-shelf Parts
  • 23rd June - Codesake::Dawn – Static Code Analysis Security Scanner For Ruby
  • 20th June - Source Code Hosting Service Code Spaces Deleted By Hacker
  • 18th June - Don’t Get Hacked – Have A Free Acunetix Security Scan
  • 16th June - SHODAN – Expose Online Devices (Wind Turbines, Power Plants & More!)
  • 12th June - 14-Year Olds Hack ATM With Default Password
  • 9th June - OWASP Mantra 0.92 – Browser Based Security Framework
  • 6th June - Important OpenSSL Patch – 6 More Vulnerabilities
  • 4th June - OWASP NINJA-PingU – High Performance Large Scale Network Scanner
  • 2nd June - Spotify Hacked – Rolls Out New Android App
  • 30th May - Bro – Passive Open-Source Network Traffic Analyzer
  • 28th May - Pirated ‘Watch Dogs’ Game Made A Bitcoin Mining Botnet
  • 26th May - Moscrack – Cluster Cracking Tool For WPA Keys
  • 22nd May - eBay Hacked – 128 Million Users To Reset Passwords
  • 20th May - Hook Analyser 3.1 – Malware Analysis Tool
  • 14th May - Navy Sys Admin Hacks Into Databases From Aircraft Carrier
  • 13th May - Acunetix Vulnerability Scanner 9.5 Released
  • 7th May - MagicTree v1.3 Available For Download – Pentesting Productivity
  • 6th May - Teen Accused Of Hacking School To Change Grades
  • 2nd May - Host-Extract – Enumerate All IP/Host Patterns In A Web Page
  • 1st May - Microsoft Confirms Internet Explorer 0-Day
  • 29th April - BlindElephant – Web Application Fingerprinter
  • 24th April - Viber Vulnerable To Man In The Middle Attack (MITM)
  • 22nd April - RAWR – Rapid Assessment of Web Resources
  • 17th April - Royal Canadian Mounted Police Arrest Heartbleed Hacker
  • 15th April - Kvasir – Penetration Testing Data Management Tool
  • 9th April - Heartbleed Bug SSL Vulnerability – Everything You Need To Know
  • 7th April - Sysdig – Linux System Troubleshooting Tool
  • 3rd April - Oracle Java Cloud Service Vulnerabilities Publicly Disclosed
  • 1st April - Agnitio v2.1 Released – Manual Security Code Review Tool
  • 26th March - Security Vendor Trustwave Named In Target Suit
  • 17th March - Blackhash – Audit Passwords Without Hashes
  • 14th March - NSA Large Scale TURBINE Malware Also Target Sysadmins
  • 11th March - ODA – Online Web Based Disassembler
  • 6th March - Target CIO Beth Jacob Resigns After Huge Breach
  • 4th March - EyeWitness – A Rapid Web Application Triage Tool
  • 26th February - Apple Retires Support Leaving 20% Of Macs Vulnerable
  • 24th February - wig – WebApp Information Gatherer – Identify CMS
  • 19th February - 2 Different Hacker Groups Exploit The Same IE 0-Day
  • 14th February - Azazel – Userland Anti-debugging & Anti-detection Rootkit
  • 12th February - The Mask AKA Careto Espionage Malware
  • 11th February - Yes – We Now Have A Facebook Page – So Please Like It!
  • 5th February - Hash Identifier – Identify Types Of Hashes Used To Encrypt Passwords
  • 3rd February - A Story Of Social Engineering – How @N Lost His $50,000 Twitter Handle
  • 24th January - PACK – Password Analysis & Cracking Kit
  • 22nd January - The 25 Worst Passwords Of 2013 – “password” Is Not #1
  • 10th January - Capstone – Multi-platform, Multi-architecture Disassembly Framework
  • 8th January - Yahoo! Spread Bitcoin Mining Botnet Malware Via Ads
  • 6th January - xssless – An Automated XSS Payload Generator Written In Python
2013
  • 23rd December - Researchers Crack 4096-bit RSA Encryption With a Microphone
  • 12th December - THC-Hydra 7.5 Released – Fast Parallel Network Logon Cracker
  • 9th December - Linux.Darlloz Worm Targets x86 Linux PCs & Embedded Devices
  • 5th December - Sandboxie – Sandbox Your Browser / Software / Programs In Windows
  • 3rd December - Stuxnet 2 Under Development By Spy Agencies?
  • 25th November - vBulletin.com Hacked – Forum User Emails & Encrypted Passwords Leaked
  • 22nd November - LANs.py ARP Spoofer – Multithreaded Asynchronous Packet Parsing/Injecting
  • 20th November - Cupid Media Hack Exposes 42 Million Passwords In Plain Text
  • 19th November - HashTag – Password Hash Type Identification (Identify Hashes)
  • 16th November - Linux Backdoor Fokirtor Injects Traffic Into SSH Protocol
  • 13th November - hashcat Download – Password Hash Cracking Tool
  • 12th November - Another IE 0-Day Hole Found & Used By In-Memory Drive By Attacks
  • 6th November - aidSQL – PHP Application For SQL Injection Detection & Exploitation
  • 4th November - Anonymous Targets Singapore For Proposed Internet Licensing Rules
  • 30th October - FoxOne Free OSINT Tool – Server Reconnaissance Scanner
  • 28th October - Major Adobe Hack – Acrobat & ColdFusion Source Code Leaked
  • 16th October - AxCrypt – Open Source Windows File Encryption Software
  • 10th October - AVG, Avira and WhatsApp Websites DNS Jacked By Pro-Palestinian Hacktivists
  • 7th October - Mutillidae – Vulnerable Web-Application To Learn Web Hacking
  • 10th September - Google’s Chrome Apps – Are They Worth The Risk?
  • 5th September - Just Crypt It – How To Send A File Securely Without Additional Software
  • 10th July - Smooth-Sec – IDS/IPS (Intrusion Detection/Prevention System) In A Box
  • 18th June - PRISM, Edward Snowden, Big Brother & More Stuff We Already Knew
  • 12th June - OWASP Bricks – Modular Deliberately Vulnerable Web Application
  • 30th May - 4 Former LulzSec Members Sentenced To Prison Time In The UK
  • 14th May - PentesterLab Review – How To Learn Penetration Testing
  • 18th April - Large Scale Botnet Brute Force Password Cracking Against WordPress Sites
  • 20th March - Andrew Auernheimer AKA Weev Gets 41 Months Jail Time For GET Requests
  • 13th March - SSLyze v0.6 Available For Download – SSL Server Configuration Scanning Tool
  • 7th March - Evernote Hacked – ALL Users Required To Reset Passwords
  • 27th February - ARPwner – ARP & DNS Poisoning Attack Tool
  • 21st February - Apple, Facebook & Hundreds More Hacked By 0-Day Java Exploit
  • 6th February - Weevely – PHP Stealth Tiny Web Shell
  • 4th February - Twitter Breach Leaks 250,000 User E-mails & Passwords
  • 8th January - CERT Failure Observation Engine (FOE) – Mutational Fuzzing Tool
  • 3rd January - Microsoft Rushes Out ‘Fix It’ For Internet Explorer 0-day Exploit
2012
  • 24th December - Merry Christmas 2012 From Darknet
  • 6th December - TLSSLed v1.2 – Evaluate The Security Of A Target SSL Or TLS (HTTPS) Web Server Implementation
  • 29th November - Noted Chinese Hacker Wicked Rose Heading Antivirus Company Anvisoft
  • 13th November - Hack.me – Build, Host & Share Vulnerable Web Application Code
  • 6th November - VMWare ESX Source Code Leaked On The Internet
  • 15th October - Web-Sorrow v1.48 – Version Detection, CMS Identification, Enumeration & Server Scanning Tool
  • 2nd October - Hackers Break Into White House Military Network
  • 5th September - CrowdRE – Crowdsourced Reverse Engineering Service From CrowdStrike
  • 29th August - 1 Million Accounts Leaked From Banks, Government Agencies & Consultancy Firms
  • 27th August - XMPPloit – A Tool to Attack XMPP Connections
  • 17th August - Microsoft Patches Critical Security Vulnerabilities In Windows, Office, IE, Exchange & SQL Server
  • 8th August - chapcrack – A tool for parsing and decrypting MS-CHAPv2 network handshakes.
  • 31st July - Sophos Offers Free Android Antivirus App
  • 23rd July - Hcon Security Testing Framework (HconSTF) v0.4 – Fire Base
  • 20th July - Nvidia Investigates Claims Of Online Store Compromise During Spate Of Hacking
  • 18th July - spt v0.6.0 – Simple Phishing Toolkit Available For Download
  • 16th July - Yahoo! Voices Hacked With SQL Injection – Passwords In Plaintext
  • 12th July - Microsoft Enhanced Mitigation Evaluation Toolkit (EMET) 3rd Party GUI
  • 9th July - Android Malware App Covertly Makes Purchases On China Mobile Market
  • 22nd June - Windows XML Core Services Exploit Attacked In The Wild – CVE-2012-1889
  • 19th June - Graphical Web Interface for OSSEC WUI AnaLogi v1.1
  • 12th June - MySQL 1 Liner Hack Gives Root Access Without Password
  • 7th June - CERT Triage Tools – Vulnerability Impact Assessment Tool
  • 31st May - Bitdefender Internet Security 2012 Review
  • 28th May - Complex Cyberwar Tool ‘Flamer’ Found Infecting Computers In Iran & Israel
  • 22nd May - Nmap 6 Released For Download – Free Network Discovery & Security Auditing Tool
  • 17th May - Hackers Break Into Bitcoin Exchange Site Bitcoinica
  • 14th May - CODENAME: Samurai Skills – Real World Penetration Testing Training
  • 8th May - Basic Fuzzing Framework (BFF) From CERT – Linux & Mac OSX Fuzzer Tool
  • 30th April - Russian Cyber-Crime Market Doubled In 2011
  • 25th April - creepy – A Geolocation Information Aggregator AKA OSINT Tool
  • 23rd April - Anonymous Take Down Official F1 Site As Bahrain Protest
  • 18th April - NfSpy – ID-spoofing NFS Client Tool – Mount NFS Shares Without Account
  • 16th April - Android Trojan Targets Japanese Market – Steals Personal Data
  • 12th April - web-sorrow – Remote Web Security Scanner (Enumeration/Version Detection etc)
  • 11th April - Microsoft Delivers 6 Out Of Band High Priority Security Updates
  • 9th April - Carbylamine – A PHP Script Encoder to ‘Obfuscate/Encode’ PHP Files
  • 5th April - Server Migration – Moved To Linode! And Changed To Nginx/PHP-FPM/APC/W3TC
  • 3rd April - Zero Day Java Vulnerability Exploited – Macs Infected With Flashback Malware
  • 2nd April - GooDork – Command Line Google Dorking/Hacking Tool
  • 29th March - Avira Joins The Crowd & Starts To Offer Mac Antivirus Software
  • 26th March - SSLyze v0.4 Released – Scan & Analyze SSL Server Configuration
  • 19th March - MS12-020 RDP Exploit Code In The Wild
  • 16th March - backfuzz – Multi-Protocol Fuzzing Toolkit (Supports HTTP/FTP/IMAP etc)
  • 12th March - Former LulzSec Leader Sabu Flips Sides & Informs For The FBI
  • 7th March - Goofile v1.5 – Search For A Specific File Type In A Given Domain.
  • 5th March - Hacker On Hacker Action – Zeus Botmaster Targets Anonymous Supporters
  • 28th February - MagicTree v1.1 Released For Download – Pen-Testing Productivity Tool
  • 21st February - UK Facebook Hacker Jailed For 8 Months
  • 15th February - xSQLScanner – Database Password Cracker & Security Audit Tool For MS-SQL & MySQL
  • 7th February - At Last – Adobe Launches Sandboxed Flash Player For Firefox
  • 31st January - theHarvester – Gather E-mail Accounts, Subdomains, Hosts, Employee Names
  • 25th January - Super Powered Malware Sandwiches Found In The Wild – Frankenmalware
  • 19th January - Mobius Forensic Toolkit 0.5.10 – Forensics Framework To Manage Cases & Case Items
  • 12th January - Sprint Adds Google Wallet Into New NFC Capable Phones
  • 9th January - Arachni v0.4 Released – High-Performance (Open Source) Web Application Security Scanner Framework
  • 5th January - Ramnit Worm Stealing Facebook Account Passwords, E-mail Address & Bank Details
2011
  • 29th December - Patator – Multi Purpose Brute Forcing Tool
  • 28th December - US Subway Stores POS Hacked For $3Million Dollars
  • 22nd December - Social Engineering Vulnerability Evaluation and Recommendation Project
  • 20th December - Cybercrooks May Be Able To Force Mobile Phones To Send Premium-Rate SMS Messages
  • 19th December - MySQLPasswordAuditor – Free MySQL Audit/Password Recovery & Cracking Tool
  • 15th December - No BEAST Fix From Microsoft In December Patch Tuesday – But They Fixed Duqu Bug
  • 7th December - sslyze – Fast and Full-Featured SSL Configuration Scanner
  • 5th December - GCHQ Code Breaking Challenge Solved Through Googling
  • 1st December - The Mole Download – Automatic SQL Injection Tool For Windows
  • 29th November - Twitter Purchases WhisperCore – Full Disk Encryption For Android Phones
  • 25th November - VoIP Hopper 2.01 Released – IP Phone VLAN Hopping Tool
  • 23rd November - X-Scan by XFocus – Basic Free Network Vulnerability Scanner
  • 22nd November - OpenPGP JavaScript Implementation Enables Encrypted Webmail
  • 21st November - sqlsus 0.7.1 Released – MySQL Injection & Takeover Tool
  • 18th November - Julian Assange Hires Pirate Bay Lawyer
  • 17th November - GoLISMERO – Web Application Mapping Tool
  • 15th November - Private Signed Certificate From Malaysian Government Used To Spread Malware
  • 14th November - w3af v1.1 Released For Download – Web Application Attack & Audit Framework
  • 9th November - Apple Bans Security Researcher Charlie Miller For Exposing iOS Exploit
  • 3rd November - Rec Studio 4 – Reverse Engineering Compiler & Decompiler
  • 2nd November - 13 Out Of 15 Popular CAPTCHA Schemes Vulnerable To Automated Attacks
  • 1st November - DirBuster Download – Brute Force Directories & Files Names
  • 27th October - Facebook Attachment Uploader Owned By A Space
  • 24th October - THC SSL DoS/DDoS Tool Released For Download
  • 20th October - German Federal Trojan (0zapftis/Bundestrojaner) Eavesdrops On Skype, IE, Firefox, MSN Messenger & More
  • 18th October - winAUTOPWN v2.8 Released For Download – Windows Auto-Hacking Toolkit
  • 17th October - The U.S. Department of Defense Hit With $4.9B Lawsuit Over Data Breach
  • 14th October - CAINE (Computer Aided INvestigative Environment) – Digital Forensics LiveCD
  • 12th October - VeriSign Demands The Power To Take Down Websites/Domains
  • 11th October - File Disclosure Browser – Tool To Explore .DS_Store Files
  • 10th October - New Research Shows Facebook’s URL Scanner Is Vulnerable To Cloaking
  • 6th October - CIAT – The Cryptographic Implementations Analysis Toolkit
  • 5th October - Security By Obscurity Not So Bad After All?
  • 4th October - MagicTree v1.0 Released – Productivity Tool For Penetration Testers
  • 3rd October - Anonymous Twitter Alternative Created For Protesters & Revolutionaries
  • 29th September - Multi Threaded TCP Port Scanner For Linux & Windows
  • 27th September - MySQL.com Compromised & Spreading Malware
  • 20th September - NetworkMiner v1.1 Released – Windows Packet Analyzer & Sniffer
  • 19th September - Google Patches 32 Chrome Browser Bugs & Releases Version 14
  • 15th September - Lilith – Web Application Security Audit Tool
  • 14th September - WAVSEP – Web Application Vulnerability Scanner Evaluation Project
  • 13th September - Script Kiddies Lay Claim To NBC News Twitter Account Hack
  • 6th September - winAUTOPWN v2.7 Released – Windows Autohacking Tool
  • 30th August - Hackers Get Hold Of Wildcard Google SSL Certificate – Could Hijack Gmail Accounts
  • 29th August - WebSurgery – Web Application Security Testing Suite
  • 24th August - Stealing ATM Pin Numbers Using Thermal Imaging Cameras
  • 22nd August - Arachni v0.3 Released – Web Application Security Scanner Framework
  • 18th August - Collar Bomber Gets Owned By Word Metadata & USB Drive
  • 16th August - Mediggo – Tool To Detect Weak Or Insecure Cryptosystems Using Generic Cryptanalysis Techniques
  • 12th August - Android Phones (Possibly) Hacked At Defcon On CDMA & 4G (HSPA)
  • 10th August - Agnitio v2.0 Released – Code Security Review Tool
  • 9th August - More Cyberterrorism – Taiwan Political Party Accuses China of Hacking
  • 5th August - Websecurify – Integrated Web Security Testing Environment
  • 3rd August - Zero-day Vulnerability In TimThumb Image Utility Threatens Many WordPress Sites
  • 1st August - WebsiteDefender – Ensure Your Website Security
  • 29th July - Facebook To Start Paying Bug Bounties
  • 27th July - iViZ On Demand Penetration Testing
  • 26th July - NfSpy – ID-spoofing NFS Client – Falsify NFS Credentials
  • 21st July - OS X Lion Brings Major Security Overhaul To Apple Users
  • 20th July - exploitdbee.py – Easily Search For Exploits In BackTrack’s Exploitdb (files.csv).
  • 18th July - AnonPlus/Anon+ – The Anonymous Social Network
  • 15th July - Mantra Security Toolkit 0.6.1 Released – Browser Based Hacking Framework
  • 13th July - French Company Intego Release First iPhone Malware Scanner
  • 12th July - WPScan – WordPress Vulnerability Scanner
  • 11th July - Malicious PDF Files To Exploit iPhone & iPad Zero Day In The Wild
  • 5th July - Vega Vulnerability Scanner Download – Web Security Tool
  • 4th July - Security Researchers Discover 4 Million Strong ‘Indestructible’ Botnet – TDSS/TDL
  • 1st July - sslsniff v0.7 – SSL Man-In-The-Middle (MITM) Tool
  • 29th June - Groupon India Subsidiary Leaks 300,000 Plain Text User Passwords
  • 28th June - Metasploitable – Test Your Metasploit Against A Vulnerable Host
  • 23rd June - ksymhunter – Routines For Hunting Down Kernel Symbols
  • 21st June - Hackers Exploiting Latest Adobe Flash Bug On Large Scale
  • 20th June - Zed Attack Proxy – ZAProxy v1.3.0 Released – Integrated Penetration Testing Tool
  • 16th June - Malaysia Government Sites Under Attack From Anonymous
  • 15th June - Skipfish 1.94b Released – Active Web Application Security Reconnaissance Tool
  • 13th June - IMF (International Monetary Fund) Suffer Major Breach In Sophisticated Cyberattack
  • 8th June - Burp Suite Free Edition v1.4 – Web Application Security Testing Tool
  • 7th June - RSA Finally Admits 40 Million SecurID Tokens Have Been Compromised
  • 6th June - FaceNiff – Taking FireSheep Mobile – Sniff & Intercept Web Sessions With Android
  • 2nd June - Targeted Phishing Attacks Carried Out On Gmail – Likely From China
  • 1st June - Microsoft Enhanced Mitigation Evaluation Toolkit (EMET)
  • 31st May - Lockheed Martin Hacked – Rumoured To Be Linked to RSA SecurID Breach
  • 30th May - Sniffjoke 0.4.1 Released – Anti-sniffing Framework & Tool For Session Scrambling
  • 27th May - Sony PlayStation Network (PSN) Reopens In Asia
  • 25th May - SIPVicious SIP Scanner – VoIP Hacking Security Auditing Tool
  • 24th May - Hotmail Exploit Has Been Silently Stealing E-mail
  • 23rd May - Malware Analyser v3.0 – A Static & Dynamic Malware Analysis Tool
  • 20th May - Google Proposes Way To Speed Up SSL Handshake
  • 18th May - BackTrack 5 Released – The Most Advanced Linux Security Distribution & LiveCD
  • 17th May - Sony Brings Back PSN & Gives Away Freebies After Hack
  • 16th May - pytbull – Intrusion Detection/Prevention System (IDS/IPS) Testing Framework
  • 13th May - Mac Malware Becoming a Serious Threat
  • 11th May - peepdf – Analyze & Modify PDF Files
  • 10th May - VUPEN Whitehats Claim To Have Broken Chrome Sandbox
  • 5th May - ArpON v2.2 Released – Tool To Detect & Block ARP Spoofing
  • 4th May - Sony Loses 25 Million More Customer Account Details Through SOE (Sony Online Entertainment)
  • 2nd May - sslsnoop v0.6 – Dump Live Session Keys From SSH & Decrypt Traffic On The Fly
  • 28th April - Sony PlayStation Network Hack Resulted In Stolen User Data & Lawsuit
  • 26th April - OWASP Hatkit Proxy Project – HTTP/TCP Intercepting Proxy Tool
  • 25th April - Sony Rebuilding PlayStation Network (PSN) – Down 4 Days So Far
  • 21st April - SearchDiggity – GUI Front-End For GoogleDiggity & BingDiggity
  • 20th April - Microsoft Implements Company Policy For Vulnerability Disclosure
  • 19th April - BodgeIt Store – Vulnerable Web Application For Penetration Testing
  • 18th April - Adobe Patches Latest Flash Zero Day Vulnerability
  • 14th April - sqlmap 0.9 Released – Automatic Blind SQL Injection Tool
  • 13th April - Microsoft Unleashes Record Breaking Patch Tuesday – April 2011
  • 12th April - RawCap – Free Command Line Packet/Network Sniffer For Windows (Raw Sockets)
  • 11th April - TJX Hacker Albert Gonzalez Claims Government Made Him Do It
  • 7th April - DRIL – Domain Reverse IP Lookup Tool
  • 6th April - Google Chrome To Protect Users Against Malicious Executables
  • 4th April - Wappalyzer – Web Technology Identifier (Identify CMS, JavaScript etc.)
  • 1st April - Stupid E-mails – Damn Interested Hacking, Paid Server Indian Web, Love Hashing & More
  • 30th March - NASA Systems At Risk From Hacking Attacks
  • 29th March - T50 – Experimental Mixed Packet Injector & Network Stress Testing Tool
  • 25th March - RSA Silent About Compromise For 7 Days – Assume SecurID Is Broken
  • 24th March - CAT – Web Application Security Test & Assessment Tool
  • 23rd March - Exploits For Popular SCADA Programs Made Public
  • 22nd March - Smooth-Sec – All In One Pre-Configured IDS/IPS System
  • 21st March - Dutch Court Rules Wi-Fi Hacking Legal In Holland
  • 18th March - Wophcrack – Web Based Interface For Ophcrack Password Cracking Tool
  • 17th March - Web Hacking Incident Database Shows DoS Attacks On The Rise
  • 16th March - Ophcrack 3.3.1 & LiveCD – Free Rainbow Table Password Cracking Tool
  • 15th March - Adobe Promises Patch For Flash 0-day Being Used In Targeted Attacks
  • 11th March - Agnitio v1.2 – Manual Security Code Review Tool
  • 10th March - Day One At Pwn2Own Takes Out Microsoft Internet Explorer and Apple Safari
  • 8th March - PacketFence – Free, Open Source Network Access Control (NAC) System
  • 7th March - Google Removes ‘DroidDream’ Malware From Android Devices
  • 3rd March - Microsoft Attack Surface Analyzer – Test Software Vulnerabilities
  • 2nd March - Intel Completes $7.68B McAfee Buyout In All-Cash Deal
  • 28th February - JBoss Autopwn – JSP Hacking Tool For JBoss AS Server
  • 23rd February - Acunetix WVS (Web Vulnerability Scanner) 7 Review – Engine & Scanning Improvements
  • 17th February - Arachni v0.2.2.1 – Web Application Security Scanner Framework
  • 16th February - Apple Adds greenpois0n Jailbreak Detection to iBooks Software
  • 11th February - Mallory – Transparent TCP & UDP Proxy
  • 10th February - Tunisia Running Country Wide Facebook, Gmail & Yahoo! Password Capture
  • 8th February - Proxocket – DLL Proxy For Winsock
  • 7th February - Canadian Dating Site PlentyofFish Hacked – Passwords Leaked
  • 3rd February - Happy Chinese New Year 2011
  • 1st February - NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool
  • 28th January - Happy New Year Geohot – Court Orders Seizure Of PS3 Hacker’s Computers
  • 26th January - Mausezahn – Fast Traffic Generator/Packet Crafting Tool
  • 25th January - Digital Underground Offering Cheap Botnets For Hire
  • 24th January - Mantra Security Toolkit – Free & Open Source Browser-Based Security Framework
  • 20th January - Java Based Cross Platform Malware Trojan (Mac/Linux/Windows)
  • 18th January - Inguma Is Back – The Penetration Testing & Vulnerability Research Toolkit
  • 17th January - China Facing Problems With Android Handsets & Pre-installed Trojans
  • 12th January - MagicTree – Penetration Tester Productivity Tool
  • 6th January - Researchers Hack Mobile Calls On GSM Network
  • 5th January - cross_fuzz – A Cross-Document DOM Binding Fuzzer
  • 4th January - Internet Explorer Zero-Day Accidentally Leaked To Chinese Hackers
2010
  • 29th December - IOCTL Fuzzer v1.2 – Fuzzing Tool For Windows Kernel Drivers
  • 24th December - Merry Christmas 2010
  • 23rd December - Car Immobilisers Using Weak Encryption Schemes
  • 22nd December - WackoPicko – Vulnerable Website For Learning & Security Tool Evaluation
  • 21st December - Gawker CTO Outlines Security Improvements Post Breach
  • 16th December - Honggfuzz – Simple Command Line Software Fuzzing Tool
  • 15th December - FBI Investigating Gawker Media User Database Password Ownage
  • 14th December - SQLInject-Finder – Intelligent SQL Injection Detection Script
  • 9th December - WikiLeaks Attacks Cause Rival DDoS Retaliation
  • 8th December - TwitterPasswordDecryptor – Instantly Recover Twitter Account Passwords
  • 7th December - India Central Bureau of Investigation (CBI) Site Still Down
  • 3rd December - LFIMAP – Scan For Files Vulnerable To LFI (Local File Inclusion)
  • 2nd December - Cloud Computing Use By Criminals Increasing
  • 1st December - Armitage – Cyber Attack Management & GUI For Metasploit
  • 30th November - Windows Vista & Windows 7 Kernel Bug Can Bypass UAC
  • 25th November - BlackSheep – Detect Users Of FireSheep On The Network
  • 24th November - SHA-1 Password Hashes Cracked Using Amazon EC2 GPU Cloud
  • 22nd November - CUDA-Multiforcer – GPU Powered High Performance Multihash Brute Forcer
  • 19th November - European Banks Seeing New Wave Of ATM Skimming
  • 18th November - Crunch – Password Cracking Wordlist Generator
  • 17th November - TDL AKA Alureon Rootkit Now Infecting 64-Bit Windows 7 Platform
  • 15th November - Katana v2 (y0jimb0) – Portable Multi-Boot Security Suite
  • 12th November - PGP Users Locked Out With Latest OS X Update
  • 11th November - ddosim v0.2 – Application Layer DDOS Simulator
  • 10th November - Hotmail Always-On Encryption Breaks Microsoft’s Own Apps
  • 9th November - XSSer v1.0 – Cross Site Scripter Framework
  • 8th November - Researcher Releases Android Exploit In Webkit Browser Engine
  • 3rd November - GNS3 – Graphical Network Simulator
  • 2nd November - Sophos Launches FREE Anti-Virus Software For Mac
  • 1st November - WATOBO – The Web Application Toolbox
  • 29th October - Critical 0-day Vulnerability In Adobe Flash Player, Reader & Acrobat
  • 28th October - Firesheep Download – Session Hijacking Tool For Windows
  • 27th October - Hackers Exploit Unpatched Firefox 0day Using Nobel Peace Prize Website
  • 25th October - The Social-Engineer Toolkit (SET) – Computer Based Social Engineering Tools
  • 21st October - Malware Pushers Abuse Firefox Warning Page
  • 20th October - NSDECODER – Automated Website Malware Detection Tool
  • 19th October - Facebook Apps Leaking Personal Data To Third Parties
  • 18th October - USBsploit 0.3b – Generate Reverse TCP Backdoors & Malicious .LNK Files
  • 15th October - Half Of Home Wi-Fi Networks In The UK Vulnerable to Hacking/WiFi-Jacking
  • 14th October - Windows Credentials Editor v1.0 – List, Add & Edit Logon Sessions
  • 13th October - Facebook Introduces OTP (One-time Password) Functionality
  • 12th October - Exploit Next Generation SQL Fingerprint (ESF) – MS-SQL Server Fingerprinting Tool
  • 8th October - Adobe PDF Reader Rewrite To Include Sandbox Feature
  • 7th October - OWASP ZAP – Zed Attack Proxy – Web Application Penetration Testing
  • 6th October - Symantec Expands Security Products To Cover Android & iOS
  • 4th October - THC-Hydra 5.8 Released – Extremely Fast Multi-Threaded Login/Password Cracker
  • 1st October - Police In UK & US Charge & Arrest Multiple People Over Zeus Trojan E-banking Fraud
  • 30th September - inspathx – Tool For Finding Path Disclosure Vulnerabilities
  • 29th September - JailBreaking AppleTV Running on iOS 4.1 – iPad/iPhone 4 Jailbreak Soon?
  • 27th September - TA-Mapper v1.1 – Time and Attack Mapper – Effort Estimator For Pen-Testing
  • 24th September - Microsoft Warns Of ASP.Net Vulnerability In The Wild – Cryptographic Padding Attack
  • 23rd September - wifite – Mass Wifi WEP / WPA Key Cracking Tool
  • 22nd September - Twitter onMouseOver XSS Exploit Causes Chaos
  • 21st September - Havij Download – Advanced Automated SQL Injection Tool
  • 20th September - Interpol Chief Ronald K. Noble Has Facebook Identity Stolen
  • 17th September - CUPP – Common User Passwords Profiler – Automated Password Profiling Tool
  • 15th September - Critical Zero Day Abobe Flash Flaw Puts Android Phones At Risk
  • 14th September - sessionthief – HTTP Session Cloning & Cookie Stealing Tool
  • 10th September - Email Worm Spreading Like Wildfire – W32.Imsolk/VBMania Variant
  • 9th September - DllHijackAuditor – Free Audit Tool For DLL Hijack Vulnerability
  • 8th September - Microsoft Investigates IE CSS Cross-Origin Theft Vulnerability
  • 7th September - Arachni – Web Application Vulnerability Scanning Framework
  • 6th September - Google Agrees To Pay $ 8.5 Million To Settle Buzz Class Action Lawsuit
  • 3rd September - Malware Hash Checking Tool – Online & Offline Support
  • 2nd September - Deutsche Post Security Cup – Bug Bounty Contest
  • 1st September - Windows PowerShell DNS Server Blackhole Tool – Blacklist Domains
  • 30th August - China Policy Could Shut Out Foreign Security Firms
  • 26th August - WinAppDbg – Python Instrumentation Scripting/Debugging Tool For Windows
  • 25th August - Windows Binary Planting DLL Preloading/Hijacking Bug
  • 23rd August - DotDotPwn v1.0 – Directory Traversal Checker/Scanning Tool
  • 20th August - Intel Acquires Security Specialist McAfee For $7.68bn
  • 19th August - Tshark – Network Protocol Analyzer & Traffic Dumper
  • 17th August - Serious Vulnerability In Adobe ColdFusion Application Server
  • 16th August - RSMangler – Keyword Based Wordlist Generator For Bruteforcing
  • 13th August - Dangerous iPhone iOS JailBreak Exploit Goes Public
  • 12th August - BitBlaze – Binary Analysis Platform For Computer Security
  • 11th August - Microsoft Fixes SSL Spoofing Renegotiation Bug
  • 10th August - OpenFISMA – FISMA Compliance & Risk Management Application
  • 9th August - Adobe Scrambling To Fix Another Serious PDF Flaw
  • 5th August - Peach Fuzzing Platform – Smarfuzzer For Generation & Mutation Based Fuzzing
  • 4th August - UAE (Dubai) & Saudi Arabia To Ban BlackBerry Services With India To Follow
  • 3rd August - Weaknet Linux – Penetration Testing & Forensic Analysis Linux Distribution
  • 2nd August - GSM Hacking Coming To The Masses Script Kiddy Style
  • 30th July - iKAT – Interactive Kiosk Attack Tool v3
  • 29th July - UK ISP TalkTalk Monitoring Users Without Consent (Deep Packet Inspection)
  • 28th July - FuzzDiff – Tool For Fuzzing and Crash Analysis
  • 27th July - WPA2 Vulnerability Discovered – “Hole 196” – A Flaw In GTK (Group Temporal Key)
  • 26th July - PlainSight – Open Source Computer Forensics LiveCD
  • 23rd July - Microsoft Confirms Windows Zero Day Bug In Shortcut Files
  • 22nd July - Sagan – Real-time System & Event Log (syslog) Monitoring System
  • 21st July - Clever Attack Allows Theft Of Names & Addresses From IE & Safari
  • 20th July - thc-ipv6 Toolkit – Attacking the IPV6 Protocol
  • 19th July - Mozilla Increases Security Bug Bounty To $3000
  • 16th July - Metasploit Framework 3.4.1 Released – 16 New Exploits, 22 Modules & 11 Meterpreter Scripts
  • 15th July - Sunbelt Software Bought By GFI For An Undisclosed Sum
  • 14th July - Andiparos – Open Source Web Application Security Assessment Tool
  • 12th July - Australian Privacy Commissioner Rules Google Wifi Actions Illegal
  • 9th July - REMnux: A Linux Distribution For Reverse-Engineering Malware
  • 8th July - Regional Trojan Threat Targeting Online Banks
  • 7th July - Safe3 SQL Injector – Automatic Detection & Exploitation Of SQL Injection Flaws
  • 6th July - Tabnapping Attack On The Increase
  • 5th July - inundator v0.5 Released – IDS/IPS/WAF Evasion & Flooding Tool
  • 2nd July - Adobe Patches PDF Vulnerabilities Being Exploited In The Wild
  • 1st July - FxCop – .NET Framework Security Analysis Tool
  • 30th June - Google Chrome Set To Follow Firefox In Blocking Out-of-date Plug-ins
  • 29th June - PwnageTool 4.01 Released – Jailbreak For iPhone & iPod Firmware 4.0 (iOS4)
  • 28th June - UK Metropolitan Police To Investigate Google Wifi Data Collection
  • 25th June - w3af 1.0-rc3 Available For Download – Web Application Attack & Audit Framework
  • 24th June - Scotland Yard Arrests Teenages For Involvement In Largest English Language Cybercrime Forum
  • 23rd June - nwmap v0.1 Released – Map Network From PCAP File
  • 22nd June - Australians Propose ‘No Anti-virus – No Internet Connection’ Policy
  • 21st June - OpenSCAP – Framework For Implementing SCAP (Security Content Automation Protocol)
  • 18th June - Windows Help Vulnerability Exploited In The Wild
  • 17th June - raw2vmdk – Mount Raw Hard Disk (dd) Images As VMDK Virtual Disks
  • 16th June - iPhone 4 Pre-Order System Exposes Customer Data
  • 15th June - Onapsis Bizploit – ERP Penetration Testing Framework
  • 14th June - Microsoft Installs Firefox Add-on Without Asking During Recent Patch Tuesday
  • 10th June - Samurai Web Testing Framework v0.8 Released – Pen Testing Security LiveCD
  • 9th June - Microsoft Patches At Least 34 Bugs Including Pwn2Own Vulnerability
  • 8th June - Knock v1.3b – Subdomain Enumeration/Brute-Forcing Tool
  • 4th June - FTC Cracks Down On Spyware Seller CyberSpy Software
  • 3rd June - sectool – Security Audit Tool & IDS
  • 1st June - iPhone Security Flaw – Using a PIN Won’t Protect Your Data
  • 26th May - Bruter v1.0 Final Released – Parallel Network Login Brute Forcing Tool
  • 25th May - IBM Distributes Malware Laden USB Drives at AusCERT Security Conference
  • 24th May - FOCA – Network Infrastructure Mapping Tool
  • 21st May - 76% Of Users Exposing Their Browsing Histories
  • 20th May - Metasploit 3.4.0 Hacking Framework Released – Over 100 New Exploits Added
  • 19th May - Cloud Security – The Next Big Thing? Fortify Readiness Scorecard
  • 18th May - sqlninja v0.2.5 Released – Microsoft SQL Server (MS-SQL) SQL Injection Vulnerability Tool
  • 14th May - Two Thirds Of All Phishing Attacks Carried Out By Single Group
  • 13th May - Suricata – Open Source Next Generation Intrusion Detection and Prevention Engine
  • 12th May - New Argument Switch Attack Bypasses Windows Security Software
  • 11th May - iScanner – Detect & Remove Malicious Code/Web Pages Viruses From Your Linux/Unix Server
  • 10th May - Federal Authorities Have Seized More Than $143 Million USD Of Fake Network Equipment
  • 7th May - Jarlsberg – Learn Web Application Exploits and Defenses
  • 6th May - Untethered Userland Jailbreak For iPhone 3.1.3 & iPad 3.2 Has Arrived
  • 4th May - OpenDLP – Free & Open-Source Data Loss Prevention (DLP) Tool
  • 3rd May - New Malware Variants More Malicious Than ILOVEYOU Bug
  • 30th April - DAVTest – WebDAV Vulnerability Scanning (Scanner) Tool
  • 29th April - Texas Man Pleads Guilty To Bot Network For Hire
  • 27th April - fuzzdb – Comprehensive Set Of Known Attack Sequences
  • 26th April - Seattle Computer Security Expert Turns Tables On The Police
  • 23rd April - ReFrameworker – General Purpose Framework Modifier
  • 22nd April - PayPal Patches Critical Security Vulnerabilities
  • 21st April - The Hackers Manifesto By The Mentor – Hacker Text
  • 20th April - China Reports Millions Of Conficker Infections
  • 19th April - Netsparker Community Edition – Web Application Security Scanner
  • 16th April - Oracle Releases Emergency Patch for Java Vulnerability
  • 15th April - PBNJ – Network Architecture Monitoring Tool
  • 14th April - Hackers Penetrate Apache.org In Direct Targeted Attack
  • 13th April - x5s – Automated XSS Security Testing Assistant
  • 12th April - Serious Java Bug Exposes Users To Code Execution
  • 9th April - StreamArmor – Discover & Remove Alternate Data Streams (ADS)
  • 6th April - The New Look Darknet & A New VPS
  • 5th April - Mozilla Beats Apple & Microsoft to Pwn2Own Patch For Firefox
  • 2nd April - pwnat – NAT To NAT Client Communication Tool
  • 1st April - Open Source Keykeriki Captures Wireless Keyboard Traffic
  • 30th March - PenTBox – Penetration Testing Security Suite
  • 29th March - Browser Fingerprints – How Unique Is Your Browser – Panopticlick
  • 26th March - Flint – Web-based Firewall Rule Scanner
  • 24th March - Website Auto-complete Leaks Data Even Over Encrypted Link
  • 22nd March - skipfish – Automated Web Application Security Reconnaissance Tool
  • 18th March - Vodafone Spain Distributing Mariposa Malware
  • 16th March - OWASP CodeCrawler – Static Code Review Tool
  • 15th March - Google ‘99.9%’ Certain To Shut Down Google.cn
  • 12th March - Vicnum – Lightweight Vulnerable Web Application
  • 11th March - Zeus-related Botnet Servers Taken Offline
  • 10th March - WebRaider – Automated Web Application Exploitation Tool
  • 9th March - Energizer Duo USB Battery Charger Software Has Backdoor Trojan
  • 8th March - SAHI – Web Automation & Application Security Testing Tool
  • 5th March - Boffins Crack OpenSSL Library Using Power Fluctuations
  • 3rd March - Ncrack – High Speed Network Authentication Cracking Tool
  • 2nd March - High Tech Ticket Scalpers Earn $25 Million Profits
  • 1st March - Web Security Dojo – Training Environment For Web Application Security
  • 25th February - US School Remotely Spying On Kids With Webcams
  • 24th February - keimpx – Open Source SMB Credential Scanner
  • 23rd February - US Investigators Pinpoint Author Of Google Attack Code
  • 22nd February - Medusa 2.0 Released – Parallel Network Login Brute Forcing Tool
  • 18th February - Google Buzz Patches XSS Flaw In Mobile Version
  • 11th February - Darknet – A Finalist For The 2010 Social Security Bloggers Awards
  • 10th February - GreenSQL – Open Source Database Firewall Software
  • 9th February - Chinese Police Shut Down ‘Black Hawk Safety Net’ Hacking School
  • 5th February - SecuBat – Modular Web Vulnerability Scanner
  • 3rd February - Twitter Major Password Reset After Phishing Attack
  • 2nd February - Nmap v5.20 Released – Open Source Network Exploration & Auditing Tool
  • 1st February - Google Willing To Pay Bounty For Chrome Browser Bugs
  • 28th January - Groundspeed 1.1 – Web Application Security Add-on For Firefox
  • 27th January - Playstation 3 (PS3) Finally Hacked & Exploit Released
  • 26th January - Browser Fuzzer 3 (bf3) – Comprehensive Web Browser Fuzzing Tool
  • 25th January - Websense Offers Facebook Users Free ‘Firewall’ Service
  • 22nd January - Burp Suite v1.3 Released – Integrated Platform For Attacking Web Applications
  • 21st January - Microsoft Releases Out-Of-Band Patch For IE 0-Day Vulnerability
  • 20th January - BackTrack Final 4 Released – Linux Security Distribution
  • 19th January - IETF Completes Vulnerability Fix For SSL Renegotiation Bug
  • 18th January - Microsoft SQL Server Fingerprint Tool – BETA4
  • 15th January - Former Dark Market Admin Faces 10 Year Jail Sentence
  • 13th January - GFI EventsManager – Event Monitoring, Archiving & Management
  • 12th January - Microsoft Preps Windows Security Fix for Patch Tuesday
  • 11th January - WAFP – Web Application Finger Printing Tool
  • 8th January - Active Exploitation Of Unpatched PDF Vulnerability
  • 7th January - YASAT – Yet Another Stupid Audit Tool
  • 6th January - 2010 Bug Wreaks Havoc In Germany
  • 5th January - fimap – Remote & Local File Inclusion (RFI/LFI) Scanner
  • 4th January - Researcher Uncovers XSS Flaws In Twitter and Google Calendar
2009
  • 30th December - FindDomains v0.1.1 Released – Discover Domains/Sites/Hosts
  • 29th December - Microsoft IIS Semicolon Bug Leaves Servers Vulnerable
  • 25th December - Merry Christmas 2009
  • 23rd December - hostmap 0.2 – Automatic Hostname & Virtual Hosts Discovery Tool
  • 22nd December - Brittany Murphy Dies & Scareware Scammers Strike
  • 21st December - PDFResurrect v0.9 Released – PDF Analysis and Scrubbing Utility
  • 16th December - Is Google Public DNS Safe?
  • 14th December - Microsoft CAT.NET v1.1.1.9 – Binary Code Analysis Tool .NET
  • 10th December - Facebook Pushes Out New Privacy Settings
  • 8th December - inSSIDer v1.2.3.1014 – Wi-Fi network scanner For Windows
  • 3rd December - Microsoft Leaves Users Waiting For Black Screen Of Death Fix
  • 1st December - Process Hacker v1.7 Released – Process Viewer & Memory Editor
  • 30th November - Home Secretary says McKinnon must face US trial
  • 24th November - Metasploit 3.3 Released! Exploitation Framework
  • 23rd November - First Malicious iPhone Worm In The Wild
  • 19th November - Microsoft Confirms First Windows 7 0-Day Vulnerability
  • 17th November - Katana v1 (Kyuzo) – Portable Multi-Boot Security Suite
  • 16th November - SSL Renegotiation Bug Succesfully Used To Attack Twitter
  • 11th November - Jailbroken iPhone Users Get Rickrolled
  • 10th November - Turbodiff v1.01 BETA Released – Detect Differences Between Binaries
  • 9th November - Facebook Used By Whitewell Trojan To Communicate
  • 6th November - Binging (BETA) – Footprinting & Discovery Tool (Google Hacking)
  • 5th November - Windows 7 UAC (User Access Control) Ineffective Against Malware
  • 4th November - UCSniff 3.0 Released – VoIP/IP Video Sniffing Tool
  • 3rd November - Using Cloud Computing To Crack Passwords – Amazon’s EC2
  • 2nd November - RATS – Rough Auditing Tool for Security
  • 30th October - Illegal File Sharers To Be Cut Off By 2011
  • 29th October - KrbGuess – Guess/Enumerate Kerberos User Accounts
  • 28th October - Facebook E-mail Spam Conceals Malware Attack
  • 27th October - Yokoso! – Web Infrastructure Fingerprinting & Delivery Tool
  • 26th October - Web Application Security Consortium (WASC) 2008 Statistics Published
  • 22nd October - Nikto 2.1.0 Released – Web Server Security Scanning Tool
  • 21st October - Stupid E-mails – Carding, Coins, Bombs & More!
  • 20th October - Origami – Parse, Analyze & Forge PDF Documents
  • 19th October - Firefox Blocks Microsoft .NET Framework Assistant Add-on
  • 16th October - Naptha – TCP State Exhaustion Vulnerability & Tool
  • 15th October - Deep Packet Inspection Engine Goes Open Source
  • 14th October - VIPER Lab’s VAST Live Distro – VoIP Security Testing LiveCD
  • 13th October - UK Government To Launch ‘Hack Idol’
  • 9th October - Nat Probe – NAT Detection Tool
  • 7th October - AVG Stepping Up Consumer Anti-Virus Offerings
  • 6th October - Samhain v.2.5.9c – Open Source Host-Based Intrusion Detection System (HIDS)
  • 1st October - No Emergency Patch For Latest Windows Exploit
  • 24th September - Twitter DM Phishing Scam
  • 21st September - Websecurify – Web Security Testing Framework
  • 18th September - Nasty Trojan Zeus Evades Antivirus Software
  • 16th September - Flawfinder – Source Code Auditing Tool
  • 15th September - FreeBSD Local Root Escalation Vulnerability
  • 14th September - 4f: The File Format Fuzzing Framework
  • 11th September - One Of The World’s Most Prolific Music Piracy Groups Busted
  • 10th September - Haraldscan – BlueTooth Discovery Scanner
  • 9th September - Cisco & Microsoft Patch TCP Stack DoS Exploit
  • 8th September - SWFScan – Free Flash Application Security Scanner
  • 7th September - UK Has The Worst Internet Security In Europe
  • 3rd September - MySqloit – SQL Injection Takeover Tool For LAMP
  • 2nd September - Apache.org Hacked Using Remote SSH Key
  • 1st September - Graudit – Code Audit Tool Using Grep
  • 28th August - Mac OS X Snow Leopard Bundled With Malware Detector
  • 27th August - Trafscrambler – Anti-sniffer/IDS Tool
  • 25th August - TJX Hacker Albert “Segvec” Gonzalez Indicted By Federal Grand Jury
  • 21st August - IKECrack – IKE/IPSec Authentication Cracking Tool
  • 19th August - Serious Linux Kernel Vulnerability For ALL 2.4 & 2.6 Kernels
  • 18th August - Stoned Bootkit – Windows XP, 2003, Vista, 7 MBR Rootkit
  • 17th August - Twitter Being Used As Botnet Command Channel
  • 14th August - sslsniff v0.6 Released – SSL MITM Tool
  • 12th August - WordPress 2.8.3 Admin Reset Exploit
  • 10th August - Xplico – Network Forensic Analysis Tool
  • 7th August - Twitter & Facebook Taken Offline By DDoS Attacks
  • 5th August - FakeIKEd – Fake IKE Daemon Tool For MITM
  • 3rd August - Dan Kaminsky & Kevin Mitnick Hacked
  • 31st July - sqlmap 0.7 Released – Automatic SQL Injection Tool
  • 30th July - Chinese Firm Writes First SMS Worm
  • 29th July - crack.pl – SHA1 & MD5 Hash Cracking Tool
  • 28th July - Hacker Group L0pht Making A Comeback
  • 27th July - Wireshark 1.2.1 Released – Network Protocol Analyzer
  • 24th July - UAE Telco Etisalat Installs Spyware On Users Blackberries
  • 22nd July - GFI LANguard 9 Review – Network Security Scanner & Vulnerability Management Tool
  • 21st July - Mozilla Denies Firefox 3.5 Bug Is Exploitable
  • 17th July - bsqlbf v2.3 Released – Blind SQL Injection Brute Forcing Tool
  • 16th July - Chinese Company Shares Huge Malware Database
  • 15th July - Damn Vulnerable Web App – Learn & Practise Web Hacking
  • 14th July - Smart Grid Security Risks – Not So Smart Electricity Meters
  • 7th July - MultiISO LiveDVD v1.0 – BackTrack, Knoppix & Ophcrack
  • 6th July - Military Communications Hacking – Script Kiddy Style
  • 3rd July - The Middler – User Session Cloning & MITM Tool
  • 2nd July - Hospital Hacker GhostExodus Owns Himself – Arrested
  • 29th June - Michael Jackon Spam/Malware – RIP The King Of Pop
  • 25th June - BackTrack 4 Pre Release Available For Download
  • 24th June - Twitter Hack Spreads P*rn Trojan
  • 23rd June - Slowloris – HTTP DoS Tool in PERL
  • 22nd June - IT Managers Under-Estimate Impact Of Data Loss
  • 19th June - Acunetix Web Vulnerability Scanner (WVS) 6.5 Released
  • 18th June - Apple iPhone OS 3.0 Released – 46 Security Patches
  • 17th June - fm-fsf – Freakin’ Simple Fuzzer – Cross Platform Fuzzing Tool
  • 16th June - Massive Malware Outbreak Infects 30,000 Websites
  • 15th June - Honeysnap – Pcap Packet Capture File Parsing Tool
  • 11th June - FBI Unclassified E-mail Network Owned By Virus
  • 10th June - FTPXerox v1.0 – FTP File Transfer Sniffer
  • 9th June - Apple Struggling With Security & Malware
  • 4th June - WEPBuster – Wireless Security Assessment Tool – WEP Cracking
  • 1st June - Hackers Exploiting Unpatched DirectX Bug With Quicktime
  • 28th May - WarVOX Download – War Dialing Tool Software
  • 27th May - Obama To Create Cyber Security Czar In White House
  • 26th May - Technitium FREE MAC Address Changer v5 R2 Released for Windows
  • 22nd May - DNS DDoS Attack Takes Down China Internet
  • 21st May - BugSpy – Crawls The Web For Open Source Software Bugs
  • 20th May - Google Poisoning Attack Gumblar Still Causing Problems
  • 19th May - Stupid E-mails – Brute Force, Change School Grades, Hack US Military & MORE
  • 18th May - Samurai Web Testing Framework 0.6 Released – Web Application Security LiveCD
  • 14th May - Trojan in Counterfeit Copies of Windows 7 Builds Botnet
  • 13th May - Pangolin – Automatic SQL Injection Tool
  • 12th May - Ensuring Data Security During Hardware Disposal
  • 11th May - Durzosploit v0.1 – JavaScript Exploit Generation Framework
  • 8th May - Explosion Of BlackBerry Trading In Nigeria – Data Theft
  • 7th May - FBController – The Ultimate Utility to Control Facebook Accounts
  • 5th May - Torpig Botnet Hijacking Reveals 70GB Of Stolen Data
  • 4th May - Fiddler – Web Debugging Proxy For HTTP(S)
  • 30th April - Amazon Disputes Hacker Claims of Ranking Manipulation
  • 29th April - ScreenStamp! – Free Screenshot Tool With Timestamp
  • 28th April - Industrial Control Systems Safe? I Think Not
  • 27th April - OAT (OCS Assessment Tool) – Office Communication Server Security Assessment Tool
  • 23rd April - Spammers Recover from McColo Shutdown – Spam Back To 91%
  • 22nd April - EFIPW – Modify Apple EFI Firmware Passwords
  • 21st April - Hacker Develops Tool To Hide Malware in .NET Framework
  • 17th April - Charles Web Debugging Proxy – HTTP Monitor & Reverse Proxy
  • 16th April - Multiple Bugs In Anti-Virus Software Revealed
  • 15th April - Lynis 1.2.6 Released – UNIX System & Security Auditing Tool
  • 14th April - Twitter Battered By Powerful Worm Attacks
  • 13th April - Watcher – Passive Analysis Tool For HTTP Web Applications
  • 10th April - Conficker Finally Awakes & Dumps Payload
  • 9th April - Interceptor – Wireless Wired Network Tap (Fon+)
  • 8th April - Microsoft Puts Hold on Forefront Security Product Range
  • 7th April - Webtunnel 0.0.5 Released – HTTP Encapsulation and Tunnel Tool
  • 6th April - How to Scan for Conficker Worm
  • 3rd April - UCSniff – VoIP/IP Video Sniffing Tool
  • 2nd April - Conficker Day – April 1st – Uneventful
  • 1st April - winAUTOPWN – Windows Autohacking Tool
  • 31st March - Microsoft Open Source Security Tool – !exploitable Crash Analyzer
  • 27th March - Deblaze – Remote Method Enumeration Tool For Flex Servers
  • 26th March - Israel Hacker ‘The Analyzer’ Steals Over $10 Million USD
  • 25th March - ProxyStrike v2.1 Released – Active Web Application Proxy Tool
  • 24th March - Charlie Miller Does It Again At PWN2OWN
  • 23rd March - sqlsus 0.2 Released – MySQL Injection & Takeover Tool
  • 20th March - Indian Credit Card Fraud Exposed – Linked to Symantec
  • 19th March - Webshag 1.10 Released – Free Web Server Audit Tool
  • 18th March - New Conficker Variant More Aggressive
  • 17th March - dnsmap 0.22 Released – Subdomain Bruteforcing Tool
  • 16th March - BBC Unleashes Botnet For ‘Investigation’
  • 11th March - Malware Distributor & Bot Network Master Sentenced To 4 Years
  • 10th March - VideoJak – IP Video Security Assessment Tool
  • 9th March - Google Native Client Security/Hacking Contest – Win $8,192 USD!
  • 6th March - fzem – MUA (Mail User Agent) / Mail Client Fuzzer
  • 5th March - Twitter ClickJacking Vulnerability
  • 4th March - Medusa v1.5 Released – Parallel, Modular Login Brute Forcing Tool
  • 3rd March - Koobface Worm Variant Hits Facebook
  • 26th February - SSLstrip – HTTPS Stripping Attack Tool
  • 25th February - Hackers Targeting Xbox Live Players with DoS Attacks
  • 24th February - WMAT Released – Web Mail Auth Tool For Testing Web Mail Logins
  • 23rd February - Hackers Target 0-Day Vulnerability In Adobe PDF Reader & Acrobat
  • 20th February - DShield Web Honeypot Project – Alpha Version Released
  • 19th February - Satellite Feed Hacking – Your Data Isn’t Private!
  • 18th February - Fast-Track 4.0 – Automated Penetration Testing Suite
  • 17th February - NSA Together With Mitre CWE and SANS Identifies Top 25 Programming Errors
  • 16th February - BackTrack BETA 4 Released for Public Download
  • 13th February - Microsoft Offers $250K Bounty for Conficker Author
  • 11th February - Webtunnel 0.0.2 – HTTP Encapsulation and Tunnel Tool
  • 10th February - Kaspersky Lab Alleged Customer Database Hack From SQL Injection Flaw
  • 6th February - Cisco Enterprise Wireless (Wi-Fi) Equipment DoS Vulnerability Discovered
  • 5th February - FlowMatrix – Free Network Behavior Analysis System
  • 4th February - Windows 7 UAC Vulnerable – User Mode Program Can Disable User Access Control
  • 3rd February - dradis v2.0 Released – Open Source Security Reporting Tool
  • 2nd February - Chrome and Firefox Face Clickjacking Exploit
  • 30th January - Complemento v0.6 – LetDown TCP Flooder, ReverseRaider Subdomain Scanner & Httsquash HTTP Server Scanner Tool
  • 29th January - Kyrgyzstan Taken Offline by Huge Denial of Service Attack
  • 28th January - Independent Web Vulnerability Scanner Comparison – Acunetix WVS, IBM Rational AppScan & HP WebInspect
  • 27th January - Gary McKinnon Wins Right to Appeal Against Extradition
  • 26th January - List of Famous Hackers in Computer History Both White Hat and Black Hat
  • 23rd January - CeWL – Custom Word List Generator Tool for Password Cracking
  • 22nd January - Using Twitter for Data Mining and Information Gathering
  • 20th January - Acunetix Web Vulnerability Scanner 6 Review
  • 19th January - Conficker (AKA Downadup or Kido) Infections Skyrocket To An Estimate 9 Million
  • 16th January - FireCAT 1.5 Released – Firefox Catalog of Auditing Extensions
  • 15th January - Next-Gen Botnets Taking The Place of Storm and Srizbi
  • 14th January - The Associative Word List Generator (AWLG) – Create Related Wordlists for Password Cracking
  • 13th January - Fake CNN Site From Phishing E-mail Serves Trojan
  • 12th January - OWASP (Open Web Application Security Project) Testing Guide v3 Released
  • 9th January - TJX (T.J. Maxx and Marshall’s) Hacker Jailed For 30 Years
  • 8th January - Time and Attack Mapper AKA TA-Mapper – Time/Effort Estimator Tool For Blackbox Security Assessment
  • 7th January - Cisco Vulnerability Given ‘Write Once, Run Anywhere’ Treatement
  • 6th January - WITOOL v0.1 – GUI Based SQL Injection Tool in .NET
  • 5th January - Phishing Attacks Hits Twitter Users – Utilising Direct Messages
2008
  • 31st December - Happy New Year For 2009 From Darknet
  • 30th December - Burp Suite v1.2 Released – Web Application Security Testing & Attack Platform
  • 24th December - Stupid E-mails – ATM Cards, Very Important Details, VOIP Testing Tools and MORE!
  • 23rd December - Microsoft Warns of Serious MS-SQL 2000 & 2005 Vulnerability
  • 22nd December - MultiInjector v0.3 Released – Automatic SQL Injection and Defacement Tool
  • 19th December - Virtualization Security – IT Managers and Security Experts Disagree
  • 18th December - sqlmap 0.6.3 Released – Automatic SQL Injection Tool
  • 17th December - Microsoft Breaks Patch Cycle to Issue IE Patch
  • 16th December - Complemento v0.4b – LetDown TCP Flooder, ReverseRaider Subdomain Scanner & Httsquash HTTP Server Scanner Tool
  • 15th December - IE7 Exploit Also Affects IE5, IE6 and IE8! More Users In Trouble
  • 12th December - sapyto v0.98 Released – SAP Penetration Testing Framework Tool
  • 11th December - Microsoft IE7 Exploit Allows Remote Code Execution on XP & Vista
  • 9th December - Secunia Personal Software Inspector (PSI) 1.0
  • 8th December - Scammers Using Asterisk VoIP Systems to Make Calls
  • 5th December - The World’s Fastest MD5 Cracker – BarsWF
  • 4th December - Stupid E-mails – Crack Hotmail? Hack Facebook? Boyfriend Cheating?
  • 3rd December - Confused by WEP, WPA, TKIP, AES & Other Wireless Security Acronyms?
  • 2nd December - MBSA Download – Microsoft Baseline Security Analyzer
  • 1st December - Malware Researchers Discover Rootkit HKTL-BRUDEVIC Similar to Sony CD Malware
  • 27th November - FireCAT 1.4 Released – Firefox Catalog of Auditing Extensions
  • 26th November - Spam Back on the Rise with Srizbi Resurrected
  • 25th November - Browser Rider – Web Browser Exploitation Framework
  • 24th November - Julie Amero Spyware Case Finally Comes To An End
  • 20th November - ike-scan – IPsec VPN Scanner & Testing Tool
  • 19th November - Dshocker AKA Aush0k Hacker Pleads Guilty to Computer Felonies
  • 18th November - Microsoft Security Assessment Tool – Free for Windows
  • 17th November - Spam ISP McColo Cut Off From the Internet
  • 14th November - Maltego Download – Data Mining & Information Gathering Tool
  • 13th November - Express Scripts Offers $1million Reward for Cyber Extortionists
  • 12th November - Samurai Web Testing Framework – Web Application Security LiveCD
  • 11th November - WPA Wi-Fi Encryption Scheme Partially Cracked
  • 7th November - SARA – Security Auditor’s Research Assistant – Network Analysis Tool
  • 6th November - Malware Authors Jumping on the Obama Bandwagon
  • 5th November - MultiInjector – Automated Stealth SQL Injection Tool
  • 4th November - Twitter Squatting – The New Domain Jacking?
  • 3rd November - Gooscan – Automated Google Hacking Tool
  • 31st October - Morris Worm To Turn 20 – How Far Things Have Come
  • 30th October - Sam Spade Download – Network Investigation Tool for Windows
  • 29th October - Google Hacking Back in The News – Google Takes Action
  • 28th October - sqlmap 0.6.1 released – Automatic SQL Injection Tool
  • 24th October - Microsoft Rushes Out Critical RPC Bug Fix
  • 23rd October - XSS-Proxy – Cross Site Scripting Attack Tool
  • 22nd October - Swiss Researchers Sniff Password from Wired Keyboard
  • 21st October - lm2ntcrack – Microsoft Windows NT Hash Cracker (MD4 -LM)
  • 20th October - DarkMarket Carding (Credit Card Fraud) Site Part of FBI Sting
  • 17th October - Web-Harvest – Web Data Extraction Tool
  • 16th October - E-mail Scammers Target Microsoft Users
  • 15th October - Firewalk – Firewall Ruleset Testing Tool
  • 14th October - Hacker Posts List of Compromised User Accounts Online
  • 13th October - p0f – Advanced Passive OS Fingerprinting Tool
  • 10th October - Symantec to Buy MessageLabs (Email Spam and Web Traffic Filter)
  • 9th October - NetStumbler – Windows Freeware to Detects Insecure Wireless Networks
  • 8th October - MI6 Sells Digital Camera on Ebay Containing Terrorist Images
  • 6th October - fwknop – Port Knocking Tool with Single Packet Authorization
  • 3rd October - THC-ePassports – THC Clones Biometric ePassport – Elvis Presley Passport
  • 1st October - Superscan v4.0 – Fast TCP & UDP Port Scanner for Windows
  • 30th September - Pro ATM Hacker ‘Chao’ Gives Out ATM Hacking Tips
  • 29th September - dnsscan – DNS Open Recursive Resolver Scanner/Scanning Tool
  • 26th September - Brits Give Up Passwords For a £5 Gift Voucher
  • 25th September - BSQL Hacker Download – Automated SQL Injection Tool
  • 24th September - Intercage – Spam/Malware Friendly ISP Back Online
  • 23rd September - ohrwurm – RTP Fuzzing Tool (SIP Phones)
  • 22nd September - Modern Exploits – Do You Still Need To Learn Assembly Language (ASM)
  • 19th September - Surf Jack – Cookie Session Stealing Tool
  • 18th September - Web Application Security Statistics for 2008
  • 17th September - psad – Intrusion Detection and Log Analysis with iptables
  • 16th September - International Space Station Infected by Virus!
  • 15th September - PorkBind v1.3 – Nameserver (DNS) Security Scanner
  • 11th September - CSRF Vulnerability in Twitter Allows Forced Following
  • 10th September - reDuh – TCP Redirection over HTTP
  • 9th September - Google Releases New Browser Chrome – Vulnerabilities on First Day
  • 8th September - onesixtyone 0.3.2 – An Efficient SNMP Scanner
  • 5th September - Twitter Targeted by Malware Distributors
  • 4th September - XTest – VoIP Infrastructure Security Testing Tool
  • 3rd September - Productive Botnets
  • 1st September - UK Hacker Gary McKinnon Loses Appeal Against Extradition
  • 29th August - ISR-evilgrade – Inject Updates to Exploit Software
  • 28th August - Webcam Hacker Jailed for 4 Years for Spying on Teenager
  • 18th August - OpenVAS – Open Vulnerability Assessment System (Nessus is Back!)
  • 17th August - New MySpace and Facebook Worm Target Social Networks
  • 13th August - raWPacket HeX – Network Security Monitoring & Analysis LiveCD
  • 12th August - TJX Credit Card Hackers Busted – Largest US Data Breach
  • 11th August - PuttyHijack V1.0 – Hijack SSH/PuTTY Connections on Windows
  • 6th August - HD Moore’s Company BreakingPoint Suffers DNS Attack
  • 5th August - July Commenter of the Month Competition Winner 2008!
  • 4th August - UK Hacker Gary McKinnon to Fight Extradition
  • 1st August - SIPcrack – SIP Login Dumper & Hash/Password Cracker
  • 31st July - Site Guesses Your Gender via Browsing History
  • 30th July - Pass-The-Hash Toolkit v1.4 Released for Download
  • 29th July - Widespread Flaws in Online Banking Systems
  • 28th July - nUbuntu Development Kicking Off Again – Security LiveCD
  • 25th July - Exploit for Kaminsky DNS Bug Goes Wild
  • 24th July - MoocherHunter – Detect & Track Rogue Wifi Users
  • 23rd July - San Fransisco Mayor Regains Control of the Network
  • 22nd July - TSGrinder – Brute Force Terminal Services Server
  • 21st July - San Fransisco Officials Locked Out of Their Own Network
  • 18th July - Zodiac – DNS Protocol Monitoring and Spoofing Tool
  • 17th July - Facebook Bug Leaks Birthday Data
  • 16th July - Lynis – Security & System Auditing Tool for UNIX/Linux
  • 15th July - UK’s Most Spammed Man – 44,000 Junk Mails a DAY!
  • 14th July - FWAuto v1.1 – Firewall Auditing & Ruleset Analyzer Tool
  • 11th July - Google to Reveal Youtube Viewing Details to Viacom
  • 10th July - DNSenum – Domain Information Gathering Tool
  • 9th July - June 2008 Commenter of the Month Competition Winner!
  • 8th July - Pantera – Web Application Analysis Engine
  • 7th July - Which Browser Users Are More Secure?
  • 3rd July - ratproxy – Passive Web Application Security Audit Tool
  • 2nd July - Google Calendar a New Target for Phishing
  • 1st July - PAW/PAWS – Python Advanced Wardialing System
  • 30th June - China Home to at Least HALF of Malicious Web Sites
  • 27th June - Bsqlbf V2 – Blind SQL Injection Brute Forcer Tool
  • 26th June - Hackers Crack London Tube Oyster Card
  • 25th June - NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance
  • 24th June - BackTrack 3 Final Hacking LiveCD Released For Download
  • 23rd June - Botmaster Robert Matthew Bentley AKA LSDigital Sentenced
  • 20th June - Technitium FREE MAC Address Changer v5 Released
  • 19th June - Disgruntled IT Worker Gets Heavy Prison Sentence
  • 18th June - WikiScanner – Find Interesting Anonymous Edits on Wikipedia
  • 17th June - 16 Year Old Indian Hacker Busted for eBay Scam
  • 16th June - ArpON – ARP Handler Detect and Block ARP Poisoning/Spoofing
  • 13th June - May Commenter of the Month Competition Winner!
  • 12th June - New Zlob Trojan Alters Your Router Settings
  • 10th June - Virus Variant Extorts You by Encrypting Your Files
  • 9th June - OSWA Assistant – Wireless Hacking & Auditing LiveCD Toolkit
  • 6th June - Metasploit Site Hijacked by ARP Poisoning Attack
  • 4th June - ‘Untraceable’ Phone Frauders Vishing for Credit Cards
  • 3rd June - Sipflanker – Locate SIP (VoIP) Device Web Interfaces
  • 2nd June - Don’t Sweat or Scratch Your Face Whilst Flying
  • 30th May - sqlninja 0.2.3 released – Advanced Automated SQL Injection Tool for MS-SQL
  • 29th May - TJX Employee Fired for Trying to Fix Things
  • 28th May - fgdump 2.1.0 and pwdump 1.7.1 Released – Dump LanMan & NTLM Hashes
  • 26th May - UK to Become Even More Draconian with Privacy Laws
  • 23rd May - thc-Amap – Application Protocol Detection & Fingerprinting
  • 22nd May - Spammers Target Social Networking Sites
  • 21st May - Tmin – Test Case Optimizer for Automated Security Testing
  • 20th May - Three Charged With Hacking Dave & Buster’s Chain
  • 16th May - Xprobe2 Download – Active OS Fingerprinting Tool
  • 15th May - New Botnet Malware Spreading SQL Injection Attack Tool
  • 14th May - browserrecon – Passive Browser Fingerprinting
  • 13th May - oCERT – Responsing to Flaws in Open Source Software
  • 12th May - Metagoofil Download – Metadata & Information Gathering Tool
  • 9th May - Want Some COFEE? Microsoft Computer Online Forensic Evidence Extractor
  • 8th May - April Commenter of the Month Competition Winner!
  • 7th May - rtpbreak 1.3a Released – RTP Analysis and Hacking
  • 6th May - Patch Window Shrinking – Semi-Automated Reverse Engineering
  • 5th May - Sandman – Read the Windows Hibernation File
  • 2nd May - US Really Owns Your Data Now!
  • 30th April - CDPSnarf – CDP Packet Sniffer
  • 29th April - AV Firms Split Over Defcon Contest
  • 28th April - Technitium MAC Address Changer v4.8 Released for Download – Free
  • 25th April - Chocolate Owns Your Passwords
  • 24th April - Pass-The-Hash Toolkit v1.3 is Available for Download
  • 23rd April - Russia Heavy Handed Registration for Wifi
  • 22nd April - WifiZoo v1.3 Released – Passive Info Gathering for Wifi
  • 21st April - Shelling our way up
  • 21st April - Microsoft Opens the Gates to Hack Their Web Services
  • 18th April - HDIV – Java Web Application Security Framework
  • 16th April - Hackers Could Become The Hacked?
  • 15th April - sqlninja 0.2.2 Released for Download – SQL Injection Tool
  • 14th April - Keep on Fuzzing! Advice
  • 11th April - WSGW – Web Security Gateway for Secure Apache
  • 10th April - Spammers Harnessing Web Mail Servers – Gmail & Yahoo! Throttled
  • 8th April - Kraken Botnet Twice The Size Of Storm
  • 7th April - March Commenter of the Month Competition Winner!
  • 4th April - ProxyStrike – Active Web Application Proxy
  • 3rd April - Biometric Keylogger Can Grab Fingerprints
  • 2nd April - Wireshark v1.0.0 Released – Cross Platform Graphical Packet Sniffer
  • 1st April - iFrame Piggybacking on Google Searches to Install Malware
  • 31st March - WSFuzzer – Web Services Fuzzing Tool for HTTP and SOAP
  • 28th March - Mac owned on 2nd day of Pwn2Own hack contest
  • 27th March - Webshag v1.00 – Web Server Auditing Tool (Scanner and File Fuzzer)
  • 26th March - httprecon – Advanced Web Server Fingerprinting
  • 25th March - Hacking Windows NT Through IIS & FTP
  • 24th March - SecurityCompass Exploit-Me – Firefox Web Application Testing Tools
  • 21st March - New Windows XP & Vista Full Take-over Hack with Firewire
  • 20th March - .NETIDS – .NET Intrusion Detection System
  • 19th March - Core Security to Expand Market with Mark Hatton
  • 17th March - Inguma 0.0.7.2 Released for Download – Penetration Testing Toolkit
  • 14th March - Nipper Tools Download – Network Configuration Auditing Tool
  • 13th March - Goolag – GUI Tool for Google Hacking
  • 12th March - Cyber Storm II – US, UK & 3 Others Involved in Mock Cyberwar
  • 11th March - Fusil Fuzzer 0.7 – Fuzzing Functions in Python
  • 10th March - VXers Group 29A Calls it Quits
  • 7th March - Ferret Version 1.1 – Data Seepage Detection Tool
  • 6th March - February Commenter of the Month Competition Winner!
  • 5th March - Australia to Follow the UK in Terminating Content Pirates
  • 4th March - Burp Suite v1.1 Available for Download
  • 3rd March - New Sophisticated Botnets Discovered
  • 29th February - SCARE – Source Code Analysis Risk Evaluation Tool
  • 28th February - Teenage Bot Herder Admits to Infecting Military Computers
  • 27th February - NetworkMiner – Passive Sniffer & Packet Analysis Tool for Windows
  • 26th February - Hacking Does Pay! US Law Let’s Hacker Keep Fraudulent Earnings
  • 25th February - Nessconnect 1.0.1 Released – GUI, CLI & API Client for Nessus
  • 22nd February - laptop and data theft protection
  • 22nd February - SWFIntruder – Analysis and Security Testing of Flash Applications
  • 20th February - UK Proposing to Disconnect Those Involved in Piracy from the Internet
  • 19th February - Russix – LiveCD Linux Distro for Wireless Penetration Testing & WEP Cracking
  • 18th February - Apple iPhone Unlocked Again – 1.1.2 and 1.1.3 Firmware
  • 15th February - Password Hasher Firefox Extension
  • 14th February - Password List Download Best Word List – Most Common Passwords
  • 13th February - US Customs Owns Your Data?
  • 12th February - PHPIDS – Security Layer & Intrusion Detection for PHP Based Web Applications
  • 11th February - Adobe Reader Vulnerability Being Actively Exploited
  • 6th February - Kismet Download – Wireless Network Hacking, Sniffing & Monitoring
  • 5th February - January Commenter of the Month Competition Winner!
  • 4th February - FireCAT 1.3 Released – Firefox Catalog of Auditing Extensions
  • 1st February - German Police Creating Law Enforcement Trojan
  • 31st January - Bruter 1.0 Released – Parallel Windows Password Brute Forcing Tool
  • 30th January - Multilingual Worm Spreads Over MSN Messenger
  • 29th January - Metasploit Framework v3.1 Released for Download
  • 28th January - Data Leakage Bug in Mozilla Firefox Confirmed
  • 24th January - Hacked Embassy Websites Delivering Malware
  • 23rd January - mod_anti_tamper – Anti Tamper Module for Apache 2.x
  • 22nd January - BackTrack Live Hacking CD BETA 3 Released
  • 21st January - Perl.com Sends Visitors to P*rn Site!
  • 18th January - sqlmap 0.5 – Automated SQL Injection Tool
  • 17th January - New Rootkits Infecting the MBR
  • 16th January - w3af Fifth BETA for Download – Automated Web Auditing and Exploitation Framework
  • 15th January - The First Reported Facebook Worm/Malware Pops Up – Secret Crush
  • 14th January - VoIP Hopper – VLAN Hopping Tool
  • 11th January - UK Government Set to Make ‘Hacking Tools’ Illegal
  • 10th January - Unicornscan Download – Fast Port Scanner
  • 9th January - GFI Survey – 4 in 10 US Companies are NOT Secure!
  • 8th January - The Revisionist – Metadata Retrieval Tool
  • 7th January - Uber Spammer Alan Ralsky Back In The News
  • 4th January - December Commenter of the Month Competition Winner!
  • 3rd January - gotroot modsecurity Rules for Apache – Anti-spam and Security
  • 2nd January - Nugache – The Next Big Storm?
  • 1st January - Happy New Year – Best Wishes from Darknet!
2007
  • 31st December - wsScanner – Web Services Footprinting, Discovery, Enumeration, Scanning and Fuzzing tool
  • 28th December - Storm Worm Spreading Some Holiday Cheer
  • 27th December - Whitetrash – Dynamic Web White-listing for Squid
  • 26th December - Trojan Targets Google Text Based Adverts
  • 24th December - Merry Xmas From Darknet
  • 24th December - Nikto 2 Released – Web Server Scanning Tool
  • 21st December - Worm Spreading Fast on Google’s Orkut Social Network
  • 19th December - Inguma 0.0.6 Released for Download – Free Pen-testing Framework
  • 18th December - Pcapy – Python Interface to LibPcap
  • 17th December - DNS Poisoning Getting Serious – Phishing from Open Recursive DNS Servers
  • 13th December - Nmap Port Scanner 4.50 Released for Download
  • 13th December - Microsoft Plugs 11 Serious Flaws in December Update
  • 12th December - KisMAC – Free WiFi Stumbler/Scanner for Mac OS X
  • 11th December - Serious Flaw in Popular Media Players from Microsoft and AOL
  • 10th December - scanrand – Download Stateless TCP Scanner with Syn Cookies
  • 7th December - SANS Top 20 Vulnerabilities Published for 2007
  • 7th December - November Commenter of the Month Competition Winner!
  • 6th December - MSF eXploit Builder – Free Win32 Exploit Development Platform
  • 5th December - Malware Numbers Still Increasing Rapidly
  • 4th December - Technitium FREE MAC Address Changer v4.7 – Released for Download
  • 3rd December - WabiSabiLabi Pimping ClamAV Vulnerability & Exploit
  • 30th November - fwtest – Firewall Testing Toolkit
  • 29th November - Security Software Moves to Consoles – Web Filtering for PS3
  • 28th November - Chaosreader – Trace TCP/UDP Sessions from tcpdump
  • 27th November - UK Consumers Lose Faith in ‘Phished’ Brands
  • 26th November - tcpflow – TCP Flow Recorder for Protocol Analysis and Debugging
  • 23rd November - Wi-Fi Jacking Extremely Common (45% of People Do!)
  • 21st November - Apple Fixes ‘Misleading’ Leopard Firewall Settings
  • 20th November - sqlninja 0.2.1-r1 – SQL Injection Tool for MS-SQL Released for Download
  • 19th November - The World’s Biggest Botnets – Peer to Peer
  • 16th November - Medusa 1.4 – Parallel Password Cracker Released for Download
  • 15th November - Doubleclick Involved in Malware Distribution
  • 14th November - Inguma 0.0.5 Released for Download – Penetration Testing Toolkit
  • 13th November - ‘Security Consultant’ Caught for Running Large Bot Network
  • 12th November - WifiZoo v1.2 – Gather Wifi Information Passively
  • 10th November - Skavenger – Source Code Auditing Tool!
  • 9th November - Graphics Cards – The Next Big Thing for Password Cracking?
  • 8th November - untidy – XML Fuzzer
  • 7th November - October Commenter of the Month Competition Winner!
  • 7th November - Thousands Hooked by Malware from Big Sites
  • 6th November - WSBang – Python Based SOAP Services Testing Tool
  • 5th November - MPAA Hacker Robert Anderson Revealed
  • 5th November - GFI End of Year Offer – Up to 50% Off
  • 2nd November - Pass-The-Hash Toolkit v1.1 Available for Download
  • 1st November - Tutorial for Fuzzled – Writing a Fuzzer with the Fuzzled Framework
  • 31st October - FireCAT 1.2 Released – Firefox Catalog of Auditing Extensions
  • 30th October - Web Integrity Checker – ISPs Inserting Ads Into Web Content
  • 28th October - Scavenging for project members on Darknet
  • 25th October - VPS – Virtual Private Server for Darknet
  • 24th October - The Next Evolution – GFI Uncovers MP3 Spam
  • 23rd October - CORE GRASP – PHP Web Application Protection Software
  • 22nd October - Police to Monitor Indian Cyber-Cafes
  • 19th October - HttpBee – Web Application Hacking Toolkit
  • 18th October - Cyber Crime Toolkits Go On Sale
  • 16th October - Posts Restored & Business (almost) Back to Usual
  • 13th October - bookmark me
  • 11th October - Server Crash
  • 9th October - SSA Version 1.5.2 – OVAL Vulnerability Assessment Software
  • 8th October - Storm Worm Descends on Blogspot
  • 5th October - Official release of SQL Power Injector 1.2 – Download Now!
  • 4th October - New German Hacking Law 202(c) – Sites Close & Possible Backfire
  • 3rd October - unmask.py – Statistical E-mail & Blog Profiling
  • 3rd October - September Commenter of the Month Competition Winner!
  • 2nd October - Common Criteria Web Application Security Scoring (CCWAPSS) Released
  • 1st October - aircrack-ng – WEP and WPA-PSK Key Cracking Program
  • 28th September - TJX (T.J. Maxx and Marshall’s) Largest Breach of Customer Data in U.S. History
  • 27th September - httprint Download – Web Server Fingerprinting Tool
  • 26th September - Gentoo Pulls the Plug after Getting Pwned
  • 25th September - aircrack-ptw – Fast WEP Cracking Tool for Wireless Hacking
  • 24th September - Voting Machines Lose to Hackers Again
  • 21st September - LORCON (Loss Of Radio CONnectivity) 802.11 Packet Library
  • 20th September - Major Web Vulnerability Effects Yahoo, MSN, Google and More
  • 19th September - IPAudit – Network Activity Monitor with Web Interface
  • 18th September - Im In Your Leenucks Box Changing Your Password
  • 17th September - Foremost – Recover Files From Drive or Drive Image AKA Carving
  • 14th September - PSP All Version Firmware Homebrew Hack Surfaces
  • 13th September - FLARE – Flash Decompiler to Extract ActionScript
  • 12th September - France Complaining of China Hacks Too
  • 10th September - PIRANA – Exploitation Framework for Email Content Filters
  • 7th September - Driftnet – View Images From Live Network Traffic
  • 6th September - Pentagon Hacked by Chinese Miltary
  • 5th September - ServiceCapture – HTTP Traffic Capture for Debugging Flash
  • 4th September - August Commenter of the Month Competition Winner!
  • 3rd September - 2007 Hacker Reverse Engineering Challenge
  • 31st August - Download pwdump6 and fgdump version 1.6.0 available now.
  • 30th August - Microsoft UK Defaced by Saudi Hackers
  • 29th August - FireCAT 1.1 Released – Turn Firefox into a Security Platform
  • 28th August - Refog Free Keylogger – KGB Key Logger Review
  • 28th August - Vista Security Feature – Teredo Protocol Analysis
  • 27th August - Pixy – New & Free Open-source XSS and SQL Injection Scanner for PHP Programs
  • 23rd August - Caller ID Spoofing to be Made Illegal in the USA
  • 22nd August - w3af – Web Application Attack and Audit Framework
  • 21st August - Vista Security Claims Debunked – Figures Skewed
  • 20th August - Immunity Debugger v1.0 (immdbg) Release – Download it Now!
  • 17th August - PDF & Image Attachment Spam – The New Problem with E-mail
  • 16th August - German Hacker Successfully Clones E-Passports
  • 15th August - rtpBreak – RTP Analysis & Hacking Tool
  • 14th August - Russian Elcomsoft Finds Backdoor in Quicken Passwords
  • 13th August - June Commenter of the Month Competition Winner Daniel and his Prizes
  • 10th August - mssql-hax0r v0.9 – Multi-purpose MS-SQL injection script
  • 9th August - NASA Hacker Gary McKinnon Wins Right to Lords Appeal Extradition Hearing
  • 8th August - XSS Warning – A Security Extension/Add-on for Firefox
  • 7th August - The Homeland Security Department Suffered More Than 800 Successful Hack Attacks
  • 6th August - Inguma – Penetration Testing Toolkit
  • 3rd August - Vista more secure than Mac OSX and Linux?
  • 2nd August - LLDP – Link Layer Discovery Protocol Fuzzer
  • 2nd August - OpenMusic – Free Music for a free World
  • 1st August - July Commenter of the Month Competition Winner 2007!
  • 1st August - Security Freak Video Lectures – Hacking, Programming, Networking & More
  • 30th July - Hackers Steal U.S. Government Corporate Data from PCs – AGAIN
  • 27th July - Babel Enterprise – Cross Platform System Auditing Tool
  • 26th July - TimeWarner DNS Hijacking IRC Servers to Stop DDoS Attacks
  • 25th July - Dr. Morena – Firewall Configuration Testing Tool
  • 24th July - Some Guidelines on How to Secure your Ubuntu Installation
  • 23rd July - piggy – Download MS-SQL Password Brute Forcing Tool
  • 22nd July - The greatest virus of all time
  • 20th July - Learn to use Metasploit – Tutorials, Docs & Videos
  • 19th July - FTester – Firewall Tester and IDS Testing tool
  • 18th July - Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt
  • 17th July - Sandcat by Syhunt – Web Server & Application Vulnerability Scanner
  • 16th July - The Soft Underbelly? – Database Security
  • 13th July - FG-Injector – SQL Injection & Proxy Tool
  • 12th July - Hacking with Ramzi
  • 10th July - PowerShell – More than the command prompt
  • 10th July - Pentagon E-mail System HACKED
  • 9th July - sqlget v1.0.0 – Blind SQL Injection Tool in PERL
  • 6th July - Apparently 8/10 High Traffic or ‘Big’ Websites are Vulnerable
  • 5th July - Proxmon – Proxy Log Monitoring Tool
  • 4th July - Trojan Mimicks Windows Activation Interface – KardPhisher
  • 3rd July - Selenium – JavaScript Web Application Security Testing Tool
  • 2nd July - Piping Data in DOS on Windows – Video
  • 2nd July - tcpxtract – Extract Files from Network Traffic AKA Carving
  • 2nd July - June 2007 Commenter of the Month Competition Winner!
  • 29th June - OAPScan – Oracle Application Server Scanner
  • 28th June - VBootkit Bypasses Vista’s Digital Code Signing
  • 27th June - ProxyFuzz – MITM Network Fuzzer in Python
  • 26th June - The Kcpentrix Project – Penetration Testing Toolkit LiveDVD
  • 25th June - Hackers Invited to Crack Internet Voting
  • 22nd June - sqlninja 0.1.2 Released for Download – SQL Injection Tool
  • 21st June - AOL Has An Odd Password System
  • 20th June - Fake NetBIOS Tool – Simulate Windows Hosts
  • 19th June - Government Accountability Office Report Slams FBI Internal Security
  • 18th June - Trinity Rescue Kit Download – Free Recovery and Repair for Windows
  • 16th June - Netstat Revealed!
  • 15th June - Phrack 64 Released – It’s been a long time..
  • 14th June - Fuzzled – PERL Fuzzing Framework
  • 13th June - Darknet Videos
  • 8th June - stealth techniques – syn
  • 8th June - yahoo password grabber
  • 8th June - Priamos Project – SQL Injector and Scanner
  • 6th June - Zalewski (lcamtuf) Strikes Again – More Vulnerabilites in IE and Firefox
  • 5th June - SQLBrute – SQL Injection Brute Force Tool
  • 4th June - Michigan Man Fined $400 for Using Coffee Shop’s Wi-Fi Network
  • 3rd June - Win GFI T-shirts, Mugs and Keychains along with your iPod or PSP!
  • 1st June - Sguil – Intuitive GUI for Network Security Monitoring with Snort
  • 31st May - Google Acquires Web Security Startup GreenBorder
  • 30th May - OWASP – SQLiX Project – SQL Injection Scanner
  • 29th May - Commenter of the Month Competition
  • 28th May - Technitium Free MAC Address Changer v4.5 Released
  • 25th May - Consulting Licence Offer From Redseal – Security Risk Manager (SRM)
  • 24th May - Foundstone Blast – TCP Network Service Stress Test Tool
  • 23rd May - Google Launches Online Security & Malware Blog
  • 22nd May - Nemesis – Packet Injection Suite
  • 21st May - Cisco IOS FTP Backdoor Ripe for Hackers
  • 18th May - pwdump6 1.5.0 as well as fgdump 1.5.0 Released for Download
  • 17th May - ISIC – IP Stack Integrity & Stability Checker
  • 16th May - Comprehensive SQL Injection Cheat Sheet
  • 15th May - Ubuntu Ultimate Edition is Cool
  • 14th May - VoIP Security Testing Tools List from VoIPSA
  • 12th May - Recent Down-time at Darknet
  • 11th May - Outpost Security Suite PRO Review
  • 8th May - GFI Free Endpoint Scanner – Online Portable Storage Device Scanning
  • 7th May - Hacker Files, Tools & Software Repository – leetupload.com
  • 4th May - Scapy – Interactive Network Packet Manipulation
  • 2nd May - That ‘magic’ number
  • 28th April - login (security through obscurity) – weird PHP script
  • 27th April - Bot Infections Surges to 1.2 Million
  • 26th April - SSA 1.5.1 Released – Security System Analyzer an OVAL Based Scanner
  • 25th April - Social Engineering Gets a Big Jewel Heist
  • 24th April - Techm4sters Releases ProTech Security Distribution
  • 23rd April - LLTD – Link Layer Topology Discovery Protocol
  • 20th April - Google’s Blogger Platform Used to Aid Phishing Attacks
  • 18th April - IE 7 Flaw Could Help Phishers – Error Message Processing
  • 17th April - Damn Vulnerable Linux – DVL – IT-Security Attack and Defense
  • 16th April - Microsoft Loves you to Pirate Their Software
  • 13th April - BackTrack v2.0 – Hackers LiveCD Finally Released
  • 12th April - Slavasoft FSUM and Hashcalc md5 & File Integrity for Windows
  • 11th April - Legal to Unlock Cell Phones Since November 2006
  • 10th April - DNS Brute Force eXtract – WS-DNS-BFX
  • 9th April - Chaos Communication Camp (CCC) 2007 – Germany
  • 6th April - PHProxy 0.5 Beta Released – Web HTTP Proxy to Bypass Firewalls
  • 5th April - Smart Trojan Targets eBay Users
  • 4th April - SSA 1.5.1 – Security System Analyzer an OVAL Based Scanner
  • 3rd April - The Black & White Ball UK – Whitehat vs Blackhat
  • 2nd April - (in)Secure 1.10 Magazine – Infosec E-zine Released
  • 30th March - Metasploit Exploit Framework Version 3.0 Released
  • 29th March - Agnitum Outpost Firewall PRO Review
  • 27th March - FireCAT – Firefox Catalog of Auditing Tools
  • 27th March - JBroFuzz 0.5 from OWASP – Stateless Network Protocol Fuzzer
  • 26th March - Hackers Attack Root Servers and Slow Internet Key Traffic
  • 23rd March - ObiWaN – Web Server Brute Forcing from Phenoelit
  • 22nd March - Check Point VPN-1 Power VSX NGX – Virtual Firewalls Get Clustered
  • 22nd March - Backup Platinum – CD, FTP & LAN Backup Software Review
  • 21st March - Technika – Automate Common Exploit Tasks
  • 20th March - Up to a Quarter of Internet Connected Machines Could be Zombies
  • 16th March - MSN Password Stealing Trojan Becomes Public
  • 15th March - Stompy – The Web Application Session Analyzer Tool
  • 14th March - Huge Online Loss by Swedish Bank Nordea – Claimed to be Biggest Loss?
  • 13th March - PwdHash from Stanford – Generate Passwords by Hashing the URL
  • 9th March - Blue-Ray DRM Cracked Already?
  • 8th March - PReplay – A pcap Network Traffic Replay Tool for Windows
  • 7th March - Microsoft’s Live OneCare the WORST Anti-Virus Solution
  • 6th March - WordPress Download Server Compromised (2.1.1) – Get 2.1.2 NOW!
  • 5th March - Let’s Digest Some Messages – md5 Hash Checker for Windows
  • 5th March - Massive Security Breach Leaks Credit Card Info
  • 2nd March - the Art of Virology 03h
  • 2nd March - Handy Recovery for Recovering Deleted Data on Windows
  • 2nd March - SHA-1 Cracked – Old News, But People Still Talk
  • 1st March - A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor
  • 28th February - Sun Solaris 10 – Free Offer – Media DVD
  • 26th February - ADTool – Active Directory Domain Listing Tool
  • 25th February - Defense Workers Warned About Spy Coins for Espionage
  • 23rd February - LFT – Layer Four Traceroute and WhoB
  • 22nd February - Serious XSS Flaw in Google Desktop Allows Data Theft
  • 21st February - Why Blurring or Mosaicing Important Information is a BAD Idea
  • 20th February - Fierce Domain Scanner Released – Domain Reconnaissance Tool
  • 19th February - Another 0-day MySpace XSS Exploit
  • 17th February - sqlmap – Automated Blind SQL Injection Tool
  • 15th February - The RFID Song from Monochrom
  • 14th February - THC Hydra Download – Fast & Flexible Network Login Hacking Tool
  • 13th February - 0-day Vulnerability Effects Solaris – Disable Telnet NOW!
  • 12th February - AccessDiver – Web Site Security Testing Tool
  • 9th February - Google Fixes Serious Vulnerability in Gmail
  • 8th February - Happy 1 Year Anniversary to the Relaunch of Darknet
  • 7th February - Secunia Releases Software Inspector
  • 6th February - Spam on the Increase – Image Spam Accounting for More
  • 5th February - Caecus – Web Brute Forcing Tool with OCR Support
  • 3rd February - Cafepress.com Under Heavy DDoS Attack
  • 2nd February - Odysseus Win32 Proxy & Telemachus HTTP Transaction Analysis
  • 31st January - Visa Security Flaws Prior to Consumer Release
  • 30th January - Burp Proxy & Burp Suite – Attacking Web Applications
  • 29th January - Hacking your $60 Router into a $600 Router
  • 27th January - Introducing WHCC – Web Hack Control Center
  • 26th January - Router/Switch Default Password List Updated
  • 25th January - Technitium MAC Address Changer v4 (TMACv4) Released
  • 24th January - Phishing Fraud Cases Growing in the UK
  • 23rd January - SIP Proxy – VoIP Security Testing Tool
  • 22nd January - Logic Bomb Backfires on Hacker Employee
  • 20th January - Class President Hacks School Grades
  • 19th January - Wep0ff – Wireless WEP Key Cracker Tool
  • 18th January - PHP Security Specialist (Stefan Esser) Resigns
  • 17th January - Data Recovery – A Decent Article
  • 17th January - WordPress 2.0.7 Follows Hot on the Tail of WordPress 2.0.6
  • 16th January - Pentagon Hacker Gary McKinnon Appeals against US Extradition
  • 15th January - SPIKE Proxy – Application Level Security Assessment
  • 13th January - Rock Phish Group Accounts for 50% of Online Scams?
  • 12th January - Nmapview – Graphical Interface (GUI) for Nmap on Windows
  • 11th January - Microsoft Word 0-day Exploits – QUESTION.DOC
  • 10th January - AttackAPI 2.0 Alpha – JavaScript Hacking Suite
  • 9th January - WordPress 2.0.5 Trackback Vulnerability with Exploit
  • 9th January - MTR – Traceroute on Steroids
  • 8th January - Organised Cyber Criminals Recruiting Fresh Grads
  • 6th January - LMCrack – Windows LanMan Hash Cracker Tool with Download
  • 5th January - Serious Exploit in Windows Media Player (WMP)
  • 4th January - SIFT Web Services Security Testing Framework
  • 3rd January - Malware Outbreak During New Year – Dref-V and Trojan downloader Tibs-jy
  • 2nd January - Cain And Abel Download – Windows Password Cracker
  • 1st January - eEye Launches 0-Day Exploit Tracker
2006
  • 31st December - wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download
  • 30th December - IE & Firefox Both Effected by Fake Login Flaw
  • 29th December - GoldenEye (GoldEye) Password Cracker – Download goldeye.zip or goldeneye.zip
  • 29th December - Some Relaxing on the DMCA Regulations
  • 28th December - TXDNS 2.0.0 Released – DNS Digger for Brute Force
  • 27th December - Firefox Patches 8 Security Vulnerabilities with 2.0.0.1
  • 26th December - Awareness of Phishing is on the Up – But so are Monetary Losses
  • 25th December - Merry Christmas to All
  • 22nd December - projectBypass
  • 21st December - Skype Worm in the Wild – W32.Chatosky
  • 20th December - XSS Shell v0.3.9 – Cross Site Scripting Backdoor Tool
  • 19th December - Save Your Reputation Online with ReputationDefender
  • 18th December - SinFP 2.0.4 – OS Detection – Now Works On Windows
  • 14th December - the Art of Virology 02h
  • 14th December - Hackers Break Into Water Processing Plant Network
  • 13th December - Backframe (Formerly Backweb) JavaScript Attack Console
  • 11th December - Massive Data Theft Operation Uncovered
  • 8th December - NMAP 4.20 released
  • 8th December - Linux Reverse Engineering Hacker Challenge
  • 7th December - (IN)SECURE Magazine ISSUE 1.9 – December 2006
  • 5th December - Metasploit 3.0 Beta 3 Released
  • 4th December - Internet Explorer 7 (IE7) Vulnerability Hits the Streets
  • 2nd December - Writing Worms for Fun or Profit
  • 30th November - Hacking Tor – A Flaw Appears?
  • 28th November - the Art of Virology 01h
  • 27th November - Metasploit 2.7 Released – Automated Hacking
  • 24th November - Oracle MEGA Patch Fixes 101 Security Bugs
  • 23rd November - Vulnerability Assessment and Operational Security Testing Methodology (VAOST) – version 0.2 released
  • 22nd November - Web 2.0 Hacking with Firefox and it’s plugins
  • 21st November - AttackAPI 0.8 JavaScript Hacking Suite Available
  • 19th November - Hackers’ Project – Browser Exploit Code Hiding
  • 17th November - w3bfukk0r 0.2 Forced Browsing Tool Released
  • 15th November - McAfee buying Tel Aviv startup Onigma for $15-25 million cash
  • 15th November - Windows XP ToolBox
  • 14th November - Installing Nessus on Debian-based OSs like Ubuntu
  • 13th November - MySpace Paedo Caught by PERL Script
  • 11th November - Medusa Fast Parallel Password Cracker 1.3 Released
  • 8th November - the Art of Virology 00h
  • 8th November - Taof 0.1 Network Protocol Fuzzer Released
  • 7th November - Spamhaus & e360 Battle is Heating Up
  • 4th November - McDonalds Japan Spreads Malware on MP3 Player
  • 2nd November - Wyd – Automated Password Profiling Tool
  • 1st November - Hackers Target Home Users for Cash
  • 31st October - New Firefox vulnerability – DoS and [DELETED] – UPDATED
  • 31st October - PMD – Java Source Code Scanner
  • 30th October - Anti-Spyware Groups Still Require Legislation
  • 28th October - BobCat SQL Injection Tool based on Data Thief
  • 27th October - Security Companies Fight Against Microsoft Security Center
  • 26th October - ARPWatch-NG ARP Flooding/Spoofing Protection/Detection
  • 25th October - Tracking Users Via the Browser Cache
  • 24th October - LAPSE Sourcecode Analysis for JAVA J2EE Web Applications
  • 23rd October - The Top 5 Causes of Data Loss
  • 22nd October - Odysseus Proxy for MITM Attacks Testing Security of Web Applications.
  • 20th October - A Politically Tight Situation? Blame a HACKER!
  • 18th October - Mozilla Hires Ex-Microsoft Security Strategist Window Snyder
  • 16th October - Download pwdump 1.4.2 and fgdump 1.3.4 – Windows Password Dumping
  • 16th October - zCodec Video Codec is a TROJAN
  • 13th October - Facebook Privacy Fears
  • 12th October - FindBugs – Find Bugs in Java Programs
  • 9th October - Inprotect 0.22.5 Released – Web Interface for Nessus & Nmap
  • 5th October - California Passes Wi-Fi Security Guidance Law – War-Driving going down?
  • 4th October - Echo Mirage – A Generic Network Proxy
  • 3rd October - Browzar is Bullshit
  • 2nd October - arp-sk – ARP Swiss Army Knife Tool
  • 1st October - Security Boom Post 9/11
  • 1st October - BeEF – Browser Exploitation Framework
  • 29th September - Google Eavesdropping Software
  • 28th September - Security Compass Web Application Analysis Tool – SWAAT
  • 27th September - Super Mega Wi-Fi Hacking Machine – Janus Project
  • 26th September - Nerdcore Hits the Streets – Geek Music for the Masses
  • 25th September - FIS [File Inclusion Scanner] v0.1 – PHP Vulnerability
  • 24th September - Most Damaging Computer Attacks Rely on Stolen Logins
  • 22nd September - SIFT Web Method Search Tool
  • 21st September - DOE Hit By Hackers and Covered Up
  • 20th September - Domain Stealing or How to Hijack a Domain
  • 20th September - China Outlaws Private E-mail Servers
  • 18th September - Former Hacker Irks Microsoft in EU Dispute
  • 14th September - Impressive Open Source Intrusion Prevention – HLBR
  • 13th September - Using the capture command in a Cisco Systems PIX firewall.
  • 12th September - Moving Ahead in the War Against Botnets
  • 11th September - LCP Download – L0phtcrack LC5 Password Cracking Alternative
  • 10th September - What Responsibility do Anti-Spyware Researchers Have?
  • 7th September - Hacking Still Can’t Outdo Stupidity for Data Leaks
  • 6th September - Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2
  • 6th September - Charity Computers May Fuel Malware Wars
  • 5th September - The Top 10 PHP Security Vulnerabilities from OWASP
  • 4th September - Web Based Email Hacking with JavaScript (Hotmail Yahoo Gmail)
  • 4th September - Teen Data Exposed on Myspace
  • 1st September - Remote Network Penetration via NetBios Hack/Hacking
  • 30th August - AT&T Hack Exposes 19,000 Identities
  • 30th August - How to get Ops and takeover a channel on IRC Hack Hacking
  • 30th August - AttackAPI 0.5 – JavaScript Security Tools
  • 29th August - Link & Comment Spamming – A possible solution.
  • 27th August - Sophos Offers Free Rootkit Detection Tool/Software
  • 25th August - Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies
  • 23rd August - libtiff Vulnerability gives hope for a new GTA-less PSP exploit
  • 17th August - Bot Herders Go After MS06-40 Exploit
  • 14th August - OpenOffice.org Security ‘Insufficient’
  • 13th August - Microsoft Takes an Effort at Cutting Down Blogspam – Splogs
  • 12th August - TCPReplay suite 3.0.beta10. Released
  • 10th August - OWASP – Fortify Bug Taxonomy
  • 8th August - Cyberwar Efforts Step-Up – NASA Sites Hacked
  • 7th August - Wapiti – Web Application Scanner / Black-box testing
  • 4th August - 419 Scammers Duplicate Interpol Site
  • 3rd August - eEye Duster – Dead/Uninitialized Stack Eraser
  • 2nd August - eEye Binary Diffing Suite (EBDS)
  • 2nd August - Firefox Extension Spyware – FormSpy
  • 1st August - Israeli Hackers Join the War Against Palestinian Sites
  • 1st August - SpikeSource Spike PHP Security Audit Tool
  • 31st July - WordPress 2.0.4 Released – Fixes Security Issues
  • 30th July - Netscape.com HACKED With Cross Site Scripting (XSS) Vulnerability
  • 28th July - BASE 1.2.6 Released (Basic Analysis & Security Engine)
  • 27th July - Serious WordPress Vulnerability/Exploit Verion 2.0.3 and Below
  • 26th July - HOPE Speak Steven Rombom (Rambam) Charged
  • 25th July - Hping 2 Fixed for Windows XP SP2 (Service Pack 2)
  • 24th July - IBM Accused of Hacking
  • 21st July - Freeware MAC Address Changer – Technitium v3.1
  • 18th July - Vista more insecure than XP
  • 17th July - CAPTCHA – Safer and better looking
  • 16th July - Play v2.71 Games on your v1.5 PSP
  • 14th July - Linux Kernel 2.6.x PRCTL Core Dump Handling – Local r00t Exploit ( BID 18874 / CVE-2006-2451 )
  • 13th July - Debian Development Machine ‘gluck’ Hacked!
  • 12th July - Consultant Breached FBI’s Computers
  • 11th July - Ticketcharge.com.my website hacked
  • 11th July - HoneyBot – A Windows Based Honeypot
  • 10th July - Next Up – Hacking Nuclear Powerstations!
  • 10th July - A Day in the Life of a Spyware Company – DirectRevenue
  • 8th July - WebScarab – Web Application Analysis – New Version
  • 7th July - ‘Free’ USB Drives Defeat Company Security
  • 6th July - A Forensic Analysis of the Lost Veteran’s Administration Laptop
  • 6th July - Darknet – Subscribe by E-mail
  • 5th July - Veterans Administration Chief Says Laptop Recovered
  • 4th July - Month of Browser Bugs (MoBB)
  • 4th July - Absinthe Blind SQL Injection Tool/Software
  • 4th July - Data Mining MySpace Bulletins
  • 3rd July - Universal Hooker – An Ollydbg Plugin
  • 2nd July - Downgrade PSP v2.6 to v1.5 to play homebrew & ISO games
  • 30th June - ARP Scanning and Fingerprinting Tool – arp-scan
  • 29th June - Shadowserver Battles the Botnets
  • 28th June - Web Services Attack Frequency Increasing
  • 27th June - sqlninja 0.1.0alpha – MS-SQL Injection Tool
  • 27th June - SANS Gateway Asia 2006
  • 26th June - US Veterans Information Leaked on The Web
  • 25th June - UFO ‘Hacker’ Gary McKinnon Reveals What He Found
  • 24th June - LiveJournal Advert Installs Malware
  • 23rd June - Researchers hack Wi-Fi driver to breach laptop
  • 22nd June - Cross Site Scripting (XSS)
  • 22nd June - Botnets and Phishing Numbers Increasing Despite Crackdown
  • 22nd June - FireMaster 2.1 – A Firefox Master Password Recovery Tool
  • 21st June - Google’s Orkut Hit by Data Stealing Worm – Mw.Orc
  • 21st June - Yersinia 0.7 Released with 802.1x Support – Layer 2 Attack Framework
  • 20th June - 3Com’s TippingPoint Finds New IE Vulnerabilities
  • 20th June - Money Lost Due to Cybercrime Down Again This Year!
  • 19th June - SinFP v2.00 Released – Next Generation OS Detection Tool
  • 18th June - Microsoft got Defaced
  • 18th June - Kevin Mitnick Interview on Social Engineering
  • 17th June - British Workers Love to Snoop Salary Info, Personal Notes & Colleagues Data
  • 17th June - New MSN Worm Hitting Users – BlackAngel.B
  • 16th June - Trojan Compromises 2,200 Oregon Tax Payers
  • 16th June - CLR and SQL Server 2005
  • 15th June - SQL Power Injector v1.1 Released
  • 14th June - Security Events Around the World
  • 14th June - Spam – A Simple Guide To Keeping Your Inbox Clean
  • 13th June - Windows Vista Preview Release Download & Torrent
  • 13th June - Oedipus – Open Source Web Application Security Analysis
  • 13th June - Taiwan Kings of Spam from CipherTrust
  • 12th June - Academic Papers on Web Application Security
  • 11th June - Custom Trojans – Isn’t it Old News?
  • 10th June - Predicting Malware – Events Trigger Malware/Phishing Spikes
  • 7th June - Graph Analysis of Credit Card Loss
  • 6th June - RFID & Biometrics Used At World Cup in Germany
  • 5th June - The Top 10 Most Common Passwords
  • 3rd June - The MPAA TorrentSpy Hacker – $15,000!
  • 2nd June - THC Releases Nokia Phone ROM Images
  • 2nd June - New Spyware Blackmails Users Into Purchasing Software
  • 1st June - SyScan’06 – The Asian Hackers’ Conference
  • 1st June - My SQL2005 Diary – Part 2
  • 31st May - Without OneCare in the World.
  • 31st May - Barclays Rolls Out Free Anti-Virus Protection for Customers
  • 31st May - Fake Microsoft Patch – BeastPWS-C
  • 30th May - Viruses & Malware Monitored on a Dynamic World Map
  • 30th May - Cambodia Bans 3G So The People Can’t Get P*rn
  • 29th May - Amnesty International Irrepresible Internet Campaign
  • 29th May - Malicious Cryptography – Cryptology & Cryptovirology
  • 28th May - MySpace Hackers in Police Custody
  • 26th May - Serious Symantec Anti-Virus Vulnerability
  • 26th May - The Enemy Within The Firewall
  • 25th May - South-East Asia Vulnerable to Cyber Terrorism
  • 25th May - Carders Scamming Spammers!
  • 24th May - Security Researchers Afraid to Reveal Vulnerabilities
  • 23rd May - hackers playground… windows?
  • 23rd May - Ohio University Compromised for Over a Year!
  • 23rd May - Trojan for the Word Vulnerability in the Wild
  • 22nd May - PBNJ 1.14 Released – Diff Your Nmap Results
  • 22nd May - The Ultimate Net Monitoring Tool – Semantic Traffic Analyzer
  • 21st May - What Next? The Poker Rootkit of Course!
  • 20th May - The Biggest Web Defacement Ever
  • 19th May - Paros Proxy 3.2.12 Released – MITM HTTP and HTTPS Proxy
  • 19th May - The RFID Hackers Revealed – Real RFID Hacking
  • 18th May - Sprajax – An Open Source AJAX Security Scanner
  • 18th May - Caller ID Spoofing is Still Easy- FCC Investigates
  • 17th May - No Your Car CANNOT get a Bluetooth Virus
  • 17th May - Source Code & Software Security Analysis with BogoSec
  • 16th May - Anonymity – Hiding Your Identity in 2006
  • 16th May - Browser Security Test – Check Your Browser NOW!
  • 15th May - Microsoft Patching Practises Come Under Fire
  • 15th May - OSSEC HIDS – Open Source Host-based Intrusion System
  • 14th May - Open Source Blamed for Rootkits?
  • 13th May - I’m gonna h4x0r j00r Ferrari
  • 11th May - The Next 50 Years of Computer Security
  • 10th May - MORE Sendmail Problems – Signal Handling Vulnerability
  • 10th May - SecureDVD – Multiboot Live Security Distro’s
  • 9th May - UK hackers condemn McKinnon trial
  • 9th May - ASP.NET Memberships and Roles
  • 8th May - McAfee Seeds Mac Virus Threat FUD
  • 8th May - SinFP – Next Generation OS Detection Tool
  • 7th May - New Trojan Targets World Cup Fans – Troj/Haxdoor-IN
  • 6th May - New Password Stealing Trojan Targets WoW Players
  • 5th May - The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?
  • 4th May - AV Firms Say Windows Vista Security Claims are Bullsh*t
  • 4th May - Homeland Security Uncovers Critical Flaw in X11
  • 3rd May - Medusa Password Cracker Version 1.1 Now Available For Download
  • 3rd May - Who is Gouki?
  • 2nd May - Microsoft Shelves Support for RSA SecurID in Vista
  • 2nd May - Proof of Concept for Internet Explorer Modal Dialog Exploit
  • 30th April - Gary McKinnon Busted Because he Forgot the Time Difference
  • 28th April - Trojan Writers Coding for Money – Freezes PC for Ransom
  • 28th April - Paros Proxy 3.2.11 Released – MITM HTTP and HTTPS Proxy
  • 27th April - Oracle Releases a Default Password Scanner
  • 26th April - MS and the new IE vulnerability – Object Tag
  • 26th April - Alternatives to FrSIRT – Where to Download Exploits?
  • 25th April - Penetration Testing vs Vulnerability Assessment
  • 24th April - DIY Spyware – Get Into it for just $15
  • 21st April - Kids Learn About Cyber Security – About Time Too!
  • 20th April - Symantec Dumps L0phtcrack Password Cracker
  • 19th April - Good Password Guidelines – How to Make a Strong/Secure Password
  • 18th April - Photos as Visual Passwords Could Foil Hackers?
  • 17th April - Top 15 Security Utilities & Download Hacking Tools
  • 15th April - Some Good Tips to Secure Linux
  • 14th April - bsqlbf 1.1 – Blind SQL Injection Tool
  • 13th April - British Hacker Gary McKinnon Fears Guantanamo
  • 13th April - New Critical MEGApatch fixes 10 Vulnerabilities in Internet Explorer
  • 12th April - Download Youtube.com & Google Videos With 1 Click
  • 12th April - Paros Proxy 3.2.10 Released – MITM HTTP and HTTPS Proxy
  • 11th April - Oracle on the Quest for ‘Secure Search’ – Rival for Google Desktop?
  • 10th April - Homeland Security Scores an F for Internal Security AGAIN
  • 8th April - CIA Employees Identified Online
  • 7th April - Serious Vulnerability/Flaw Found in GPG – GnuPG
  • 6th April - China taking control of it’s own DNS servers
  • 5th April - AJAX: Is your application secure enough?
  • 4th April - IE Address Bar Spoofing
  • 4th April - The Tale of a Real Malaysian E-mail Spammer Exposed – Webflexx
  • 4th April - Google Safe Browsing Extension for Firefox & Netcraft Toolbar – Anti-Phishing
  • 3rd April - Slashdot Effect vs Digg Effect Traffic Report
  • 1st April - P*rn Database Hacked – Buyers Exposed!
  • 31st March - Jacking Wifi is ‘OK’ say Ethics Expert
  • 30th March - US Investigates Snort Sale as a Security Risk
  • 29th March - My SQL2005 Diary – Part1
  • 28th March - Ophcrack 2.2 Password Cracker Released
  • 27th March - Information about the Internet Explorer Exploit createTextRange Code Execution
  • 27th March - Sealing Wafter – Defend Against OS Fingerprinting for OpenBSD
  • 25th March - Download youtube.com videos?
  • 25th March - Spammer gets 8 years in Jail for Identity theft
  • 24th March - Is Open Source Really More Secure?
  • 23rd March - kArp – Linux Kernel Level ARP Hijacking/Spoofing Utility
  • 22nd March - Why Windows Vista ‘might’ Actually be Good
  • 21st March - pwdump6 version 1.2 BETA Released
  • 20th March - FrSIRT Starts Charging for OTHER Peoples Work (Exploits)
  • 20th March - Whos is tonyenkiducx? Who the hell are you?
  • 18th March - An Introduction to AJAX
  • 18th March - Security Cloak – Mask Against TCP/IP Fingerprinting for Windows
  • 17th March - Appledoz
  • 17th March - Measuring up the Security Risks for Mac – Are Apple Prepared?
  • 16th March - Elevator Hacks – How To Override To Skip Floors
  • 16th March - Who is Haydies? Me my self and quite possibly some one else.
  • 14th March - 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)
  • 14th March - Who is Darknet?
  • 13th March - Donations Flood in for Guilty Security Researcher Guillaume Tena
  • 13th March - VMWare Rootkits, The Next Big Threat?
  • 12th March - JTR (Password Cracking) – John the Ripper 1.7 Released – FINALLY
  • 11th March - UK Could be Going TOO Far With Digital Laws
  • 10th March - Post-Mortem Data Destruction
  • 10th March - SSL VPNs and OpenVPN – Part IV
  • 9th March - Windows Rootkits
  • 9th March - SSL VPNs and OpenVPN – Part III
  • 8th March - SSL VPNs and OpenVPN – Part II
  • 7th March - SSL VPNs and Using OpenVPN
  • 6th March - Latest RIAA Bullshit – Fair Use Policy – Can’t Use YOUR CDs on YOUR iPod
  • 6th March - Anti-Spyware Software Wars – Can’t they get along?!
  • 5th March - RIAA Dirty Tricks: Gathering Private Info On Kids Of Accused File Sharer
  • 4th March - Your Employees Don’t Care About Your Data
  • 3rd March - Norton Internet Security ‘Keylogger’ IRC Bug
  • 2nd March - Norton Antivirus Funny Bug
  • 2nd March - The RSS Tools That Diggers Use
  • 2nd March - How Computers Work – Free E-book
  • 1st March - Should Social Engineering be a part of Penetration Testing?
  • 1st March - Prostitutes want GTA (Grand Theft Auto) Banned
  • 1st March - Who is Navaho Gunleg?
  • 28th February - US considers banning DRM rootkits – Sony BMG
  • 27th February - RainbowCrack & How To Use Rainbow Crack With Rainbow Tables
  • 27th February - Malware Honeypot Projects Merge – mwcollect and nepenthes
  • 26th February - Firefox Confuses UK Government Piracy Laws
  • 25th February - Free Prep Material for LPI Linux Certification (LPI 201 and 202)
  • 24th February - mIRC Backdoor
  • 24th February - UK Wants Backdoor in Next Version of Microsoft Windows
  • 24th February - Passwords Passe at RSA
  • 23rd February - Google Desktop 3 Enterprise
  • 23rd February - The new Macbook Pro 15″ 2.0Ghz taken apart
  • 23rd February - Advertisers may face public humiliation over adware
  • 22nd February - who is backbone?
  • 22nd February - Phishing Sites Getting More Advanced with SSL
  • 22nd February - Jan 2006 Virus and Spam Statistics
  • 21st February - Google has no license for China service
  • 21st February - Antitrust case against Apple approved
  • 21st February - Severe Security Hole in Apple Mac Safari Web Browser
  • 20th February - Google’s Defense of Privacy – Tells Feds to BACK OFF
  • 20th February - Browse Anonymously at Work or School – Bypass Firewall & Proxy
  • 19th February - Spanish ‘Super’ Hacker Jailed for 2 Years over DoS attack
  • 18th February - NSA Tracking Nmap and Other Open Source Tools
  • 17th February - Locate anyone in the UK via SMS
  • 17th February - BackTrack – A merger between WHAX and Auditor
  • 16th February - Dumbest Thief Ever Busted by E-mail Habit
  • 15th February - Nmap 4.01 Released – New Features
  • 14th February - Google Desktop Privacy? OR Lack Of..
  • 13th February - Call for Authors and New Members for Relaunch of Darknet
  • 9th February - Get the ball rollin’
  • 8th February - Welcome to Darknet – The REBIRTH
Share
Tweet
Share
Buffer
WhatsApp
Email

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 1,824

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 1,727

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,115

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 2,829

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,035

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 922

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,424,401)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,078)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,504)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,310)
  • Password List Download Best Word List – Most Common Passwords (934,597)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,332)
  • Hack Tools/Exploits (674,282)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,367)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy