Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation.
It should be used on webservers and available on Docker.
Watcher capabilities
Detect emerging vulnerability, malware using social network & other RSS sources...
XSS Scanner
Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP Top 10 project and it is a highly chased vulnerability in bug bounty programs.
The scanner gets a link from the user and scan the website for XSS...
As SecurityLab wrote earlier, on December 13, SolarWinds reported that it was the victim of a cyber attack on the supply chain. Hackers funded by a foreign government broke into the networks of an American software manufacturer and implemented a malicious update for its Orion software in order...
Google announced the launch of a knowledge base with information about a class of vulnerabilities, XS XS-leaks. These vulnerabilities are related to incorrect use of the usual behavior of the web platform by modern web applications, which leads to leakage of information about the user or...
Brazil's Embraer, which is now considered the third-largest aircraft manufacturer after Boeing and Airbus, was the victim of a ransomware cyberattack last month.
Now hackers who compromised the aircraft company's network have published some of the confidential data, as Embraer refused to...
Researchers from Prevasio studied 4,000,000 public Docker images hosted on Docker Hub and found that more than half of them have critical vulnerabilities, and several thousand images contain malicious or potentially dangerous elements.
For the analysis, the specialists used their own Prevasio...
Security researchers from the company Cybereason told about the new malware that was used by the North Korean group Kimsuky (also known as Black Banshee, Velvet Chollima and Thallium) during attacks on government institutions in South Korea.
Earlier, the cybersecurity and infrastructure...
Finding Local Bins In Your Area
When I first started i burned several hundred dollars on bins i thought would work but didn't. If you want to increase your chances of success or just want to find some new bins this article might help you.
*** Hidden text: You do not have sufficient rights to...
Using PatchChecker to check vulnerabilities:
To use the patchchecker, you can either go to the publicly hosted website here at patchchecker.com or you can git clone this repo, install the required libraries, makes sure patches.db is in the same directory as app.py and then start the application...
Browser Blocker for Windows blocks common browsers from accessing the internet on Windows.
To block just run the batch as admin (Right click > Run as administrator) and select the browser.
Download:
Download Browser Blocker for Windows rar
Download Browser Blocker for Windows rar
Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish . But I have not fully copied it . I have upgraded it & cleared the Unnecessary Files . Zphisher has 37 Phishing Page Templates ; including Facebook , Twitter & Paypal . It also has 4 Port Forwarding Tools ...
At the moment, dozens of servers of the country's official structures have been destroyed, including their copies. It is specified that among the hacked portals are the sites of the President of Armenia, the head of the Nagorno-Karabakh Republic, as well as all ministries of the state. On these...
There is a difference between Xecuter activity and non-commercial hacking or console emulation.
The US Department of Justice reported that, at their request, the Dominican Republic police arrested Chinese Yuanning Chen, Frenchman Max Loarn and Canadian Gary Bowser. It is assumed that they were...
AVS
AVS is an address verification system and many sites use this to verify that this card is not used by scammers.
But some cards don’t have AVS protection and sites cannot determine the address to which the card is registered.
Bill-ship
This is one of the most asked questions.
Because By the...
This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests.
Below are a couple of different images showing examples of multiple file transfer and single verbose file transfer:
Support for multiple files
Gzip compression supported
Now...
Follow These Steps For Hack WiFi Password Using MITM Method:-
1. Goto: https://github.com/wi-fi-analyzer/fluxion
2. After Downloading fluxion. Goto Downloads and extract Fluxion
3. Goto extracted directory where fluxion.sh is located and Run ./fluxion.sh
Note- If all required files are updated...