Information Gathering
cybarrior

RTS – Real Time Scrapper

RTS (Realtime scrapper) is a tool developed to scrap all pasties,github,reddit..etc in real time to identify occurrence of search terms configured. Upon match an email

Read More »
h4a
cybarrior

Is your VPN Legit or Shit?

Those of you who frequent the darkweb should be familiar with VPN (Virtual Private Network) services and have done some research to find a trustworthy

Read More »
Tricks
cybarrior

IDM Alternative for Kali Linux

Xtreme Download Manager is a powerful tool to increase download speed up-to 500%, save streaming videos from YouTube, Metacafe, Daily-Motion, Google Video or any other

Read More »
Penetration Testing
cybarrior

Web Server Penetration Testing Checklist

Web server pen testing performing under 3 major category which is identity, Analyse and Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.

Read More »
Cyber Awareness
cybarrior

Top 10 Cyber Security Podcasts

Production values aside, IT podcasts are frequently guilty of treating the audience like they are either an 83-year-old grandmother with only the vaguest notion of

Read More »
h4a
cybarrior

Qubes OS 4.0.1 Releases

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Qubes is free

Read More »
Self Hosted
cybarrior

Best Self Hosted Alternatives

Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers. This is a long list of Free Software network

Read More »
VPN
cybarrior

NordVPN Review

NordVPN is a very popular VPN service with a large customer base. While it is highly recommended on many sites, it can be difficult to

Read More »
VPN
cybarrior

VPN.ac Review

VPN.ac is a Romania-based VPN service that provides users with advanced encryption, very secure apps, and excellent performance. Their network consists entirely of dedicated bare-metal servers

Read More »
Cyber Awareness
cybarrior

5 Eyes, 9 Eyes, 14 Eyes – Explained

In short, these are just international surveillance alliances representing various countries around the world. These surveillance alliances work together to collect and share mass surveillance

Read More »
Hacking News
cybarrior

Avengers: Endgame Leaked Online

Marvel’s latest and perhaps the most anticipated flick ever to be released Avengers: End Game has become an object of controversy lately as hackers and

Read More »
Hardware Hacking
cybarrior

Lan Turtle – MiTM Usb Ethernet Adapter

The LAN Turtle is a covert Systems Administration and Pentesting tool providing stealth remote access, network intelligence gathering, and MiTM (man-in-the-middle) surveillance capabilities through a

Read More »
Mobile hacking
cybarrior

Best Android Hack Codes

Secret hack codes are usually hidden from users to prevent misuse and exploit. These codes can reveal additional information, run manufacture tests, factory reset, check

Read More »
Malware
cybarrior

APT34 Hacking Tools Leak

As reported by Catalin Climpanu, some of the tools used by OilRig attack group have been leaked by a persona using the “Lab Dookhtegan pseudonym”.

Read More »
Penetration Testing
cybarrior

PTF – Penetration Testers Framework

The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters,

Read More »
Cyber Awareness
cybarrior

SS7 Hack Attack and Counter Measures

Signaling System No. 7 (SS7) is a series of telephony signaling protocols. Also known as CCS7 (Common Channel Signaling System 7) or CCIS7 (Common Channel Interoffice Signaling 7),

Read More »
Enumeration
cybarrior

ZMap – The Internet Scanner

ZMap is an open source single packet network scanner designed for Internet-wide network surveys. On a typical desktop computer with a gigabit Ethernet connection, ZMap

Read More »
Information Gathering
cybarrior

AQUATONE – DNS Reconnaissance

Aquatone is a tool for visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based

Read More »
Incident Response
cybarrior

RedELK – Red Team’s SIEM

Red Team’s SIEM – easy deployable tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability for

Read More »
IOT Hacking
cybarrior

MQTT-PWN: Your IoT Swiss-Army Knife

MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations, as it combines enumeration, supportive functions and exploitation modules while packing

Read More »
TOR
cybarrior

Tor Browser 8.0.8 Released

The Tor Project, the organization behind the anonymity-focused Tor browser, has announced yet another release. The Tor browser 8.0.8 is now available for use.

Read More »
Cheatsheets
cybarrior

Wireshark Cheatsheet

Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and

Read More »
CTF
cybarrior

SickOS 1.2 – CTF Walkthrough

SickOS 1.2 is the second Boot2Root Challenge in SickOS Series and is available at Vulnhub. This is an interesting CTF and requires think-out-of-the-box mentality. This

Read More »
Denial of Service
cybarrior

Xerxes – Best DoS Tool 2019

Xerxes is the most powerful DOS tool of 2019 and comes with enhanced features for stress testing. It provides the capacity to launch multiple independent

Read More »
Cheatsheets
cybarrior

Metasploit Cheat Sheet

The Metasploit Project is a computer security project that provides information on vulnerabilities, helping in the development of penetration tests and IDS signatures. Metasploit is

Read More »
Bruteforce
cybarrior

Password Cracker THC Hydra

You think your passwords are strong and secure? You are mistaken! There are numerous options to secure your password, but when it comes to the

Read More »
System Administration
cybarrior

DMARC Email Validation System

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a standard that helps protect email senders and recipients from spoofing, spam and phishing. With this, mail

Read More »
System Administration
cybarrior

DKIM Email Security Standard

DKIM email security standard was designed to make sure messages were not altered or compromised in transit between sender and receiver. It uses public-key cryptography

Read More »
Operating Systems
cybarrior

Kali Linux 2019.1 Release

Since the first release in 2013 with 1.0.0, Kali Linux has updated 24 different versions with many upgrades and bug fixes. Here we will take

Read More »
Enumeration
cybarrior

Nikto – Web Server Scanner

Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks

Read More »
Enumeration
cybarrior

Fierce – DNS reconnaissance tool

Fierce is a semi-lightweight scanner that helps locate non-contiguous IP space and hostnames against specified domains. It’s really meant as a pre-cursor to nmap, unicornscan,

Read More »
Ebooks
cybarrior

Reversing: Secrets of Reverse Engineering

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book

Read More »
Ebooks
cybarrior

The Art of Memory Forensics

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes.

Read More »

Can Hackers Be Heroes?

Can Hackers Be Heroes is a short documentary film from PBS Digital Studio. Many people think of hackers as cyber criminals, breaking into computer systems

Read More »
Documentary
cybarrior

Cyber War (Documentary Film)

Cyber War is a documentary film from Al Jazeera media network. The film is all about US cyber security and state-sponsored hacking attacks.

Read More »
Documentary
cybarrior

Zero Days (Documentary Film)

Zero Days is a documentary film produced by VPRO. The film talks about cyber security and online black markets. Zero Days paints a frightening portrait of

Read More »
IOT Hacking
cybarrior

Heathen – IoT Pentesting Framework

Heathen Internet of Things Penetration Testing Framework developed as a research project, which automatically help developers and manufacturers build more secure products in the Internet

Read More »
Documentary
cybarrior

Naked Citizens Documentary

Naked Citizens is a documentary film that shows how online and CCTV surveillance data is being used to arrest “terror suspects”.

Read More »
Sniffing and Session Hijacking
cybarrior

Netripper – Smart Traffic Sniffing

NetRipper is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related functions from a

Read More »
Reverse Engineering
cybarrior

IDA – Interactive Disassembler

ID Pro combines an interactive, programmable, multi-processor disassembler coupled to a local and remote debugger and augmented by a complete plugin programming environment.

Read More »
Penetration Testing
cybarrior

Network Penetration Testing Checklist

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners.

Read More »
Operating Systems
cybarrior

Penetration Testers Distro: Pentoo

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable

Read More »
Operating Systems
cybarrior

Parrot Security OS

Parrot is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed

Read More »
Operating Systems
cybarrior

BlackArch 2018.12.01

BlackArch Linux is an open source distribution of Linux derived from the lightweight and powerful Arch Linux operating system and designed from the ground up

Read More »
Operating Systems
cybarrior

Kali Linux 2018.4

Kali Linux is an advanced penetration testing Linux distribution used for penetration testing, ethical hacking and network security assessments.

Read More »
Information Gathering
cybarrior

Recon-ng – Web Reconnaissance Framework

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion,

Read More »
Information Gathering
cybarrior

OSINT Framework

OSINT Framework, as its name implies, is a cybersecurity framework, a collection of OSINT tools to make your intel and data collection tasks easier.

Read More »
Google Hacking
cybarrior

DorkMe – Google Dork Finder

DorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.

Read More »
Fuzzing
cybarrior

Peach Fuzzing Framework

Peach is a fuzzing framework which uses a DSL for building fuzzers and an observer based architecture to execute and monitor them.

Read More »
Enumeration
cybarrior

Nmap – Network Mapper

Nmap is a free and open source utility for network discovery and security auditing. Network mapper was designed to rapidly scan large networks, but works

Read More »
Denial of Service
cybarrior

ZIB – The Open Tor Botnet

ZIB is fully undetectable and bypasses all antivirus by running on top of Python27’s pyinstaller, which is used for many legitimate programs. The only possibility

Read More »
Cross Site Scripting
cybarrior

XSSER – From XSS to RCE

This presentation demonstrates how an attacker can utilise XSS to execute arbitrary code on the web server when an administrative user inadvertently triggers a hidden

Read More »
Cross Site Scripting
cybarrior

OWASP Xenotix XSS Exploit Framework

OWASP Xenotix XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. It provides Zero False Positive scan results with

Read More »
Cross Site Scripting
cybarrior

BeEF – Browser Exploitation Framework

The Browser Exploitation Framework (BeEF) is a powerful professional security tool. BeEF is pioneering techniques that provide the experienced penetration tester with practical client side

Read More »
Cryptography
cybarrior

Hash Algorithms

Hash functions, also called message digests and one-way encryption, are algorithms that, in some sense, use no key. Instead, a fixed-length hash value is computed

Read More »
Cryptography
cybarrior

Secret Key Cryptography

With secret key cryptography, a single key is used for both encryption and decryption. Because a single key is used for both functions, secret key

Read More »
Bruteforce
cybarrior

Hacker’s Favorite Tool: Mimikatz

Mimikatz is a post-exploitation tool written by Benjamin Delpy (gentilkiwi). It’s now well known for extracting plaintexts passwords, hash, PIN code and kerberos tickets from

Read More »