Skip to content
  • Sitemap
  • Disclaimer
  • Gadgets
  • Privacy Policy
  • Discord Forum
  • Blog
  • Boot Offline
  • Courses
    • Cyber Security School
    • Ethical Hacking Coursers
  • CTF
  • Hacker Gadgets
  • News
  • Security Books
  • Tools Directory
  • Blog
  • Boot Offline
  • Courses
    • Cyber Security School
    • Ethical Hacking Coursers
  • CTF
  • Hacker Gadgets
  • News
  • Security Books
  • Tools Directory

Search Results for: facebook

Protect yourself from cyberstalkers

Protect yourself from cyberstalkers

[ad_1] The internet has brought us all closer together than ever before. Never before in our history has mankind been able to communicate so seamlessly.… Read More »Protect yourself from cyberstalkers

HashCobra - Hash Cracking Tool

HashCobra – Hash Cracking Tool

[ad_1] hashcobra Hash Cracking tool. Usage $ ./hashcobra -H–==[ hashcobra by sepehrdad ]==–usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> – hashing algorithm [default:… Read More »HashCobra – Hash Cracking Tool

scan terraform code

tfsec v0.13.0 releases: Static analysis powered security scanner for your terraform code

[ad_1] tfsec tfsec uses static analysis of your terraforms templates to spot potential security issues. Now with terraform v0.12+ support. Features Checks for sensitive data… Read More »tfsec v0.13.0 releases: Static analysis powered security scanner for your terraform code

THE HORROR EMAIL: WHEN SITEGROUND DECIDED TO SHUT DOWN MY ENTIRE SITE DUE TO 20 LINES OF MALWARE CODE – AND THE 3 THINGS I LEARNED

THE HORROR EMAIL: WHEN SITEGROUND DECIDED TO SHUT DOWN MY ENTIRE SITE DUE TO 20 LINES OF MALWARE CODE – AND THE 3 THINGS I LEARNED

[ad_1] When comparing the difference of a shared server to a private server configuration one thing that people never consider is the fact that on… Read More »THE HORROR EMAIL: WHEN SITEGROUND DECIDED TO SHUT DOWN MY ENTIRE SITE DUE TO 20 LINES OF MALWARE CODE – AND THE 3 THINGS I LEARNED

Loki v1.2 releases: horizontally-scalable, highly-available, multi-tenant log aggregation system

Loki v1.2 releases: horizontally-scalable, highly-available, multi-tenant log aggregation system

[ad_1] Loki: like Prometheus, but for logs. Loki is a horizontally-scalable, highly-available, multi-tenant log aggregation system inspired by Prometheus. It is designed to be very cost-effective… Read More »Loki v1.2 releases: horizontally-scalable, highly-available, multi-tenant log aggregation system

pylane: python vm injector with debug tools, based on gdb

pylane: python vm injector with debug tools, based on gdb

[ad_1] pylane Pylane is a python vm injector with debug tools, based on gdb and ptrace. It uses gdb to trace python process, inject and… Read More »pylane: python vm injector with debug tools, based on gdb

[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries

[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries

[ad_1] RansomCoin Extracting metadata and hardcoded Indicators of Compromise from ransomware, in a scalable, efficient, way with cuckoo integrations. Ideally, is it run during cuckoo… Read More »[Blackhat Europe tool] RansomCoin: extract cryptocoin addresses and other indicators of compromise from binaries

ad-password-protection: password protection for Active Directory

ad-password-protection: password protection for Active Directory

[ad_1] Lithnet Password Protection for Active Directory (LPP) enhances the options available to an organization wanting to ensure that all their Active Directory accounts have… Read More »ad-password-protection: password protection for Active Directory

spraykatz: retrieve credentials on Windows machines and large Active Directory environments

spraykatz: retrieve credentials on Windows machines and large Active Directory environments

[ad_1] Spraykatz is a tool without any pretention able to retrieve credentials on Windows machines and large Active Directory environments. It simply tries to procdump machines and parses dumps locally in… Read More »spraykatz: retrieve credentials on Windows machines and large Active Directory environments

hyperpwn: provide a flexible debugger UI for GEF and pwndbg

hyperpwn: provide a flexible debugger UI for GEF and pwndbg

[ad_1] Hyperpwn Hyperpwn is a Hyper plugin to improve the display when debugging with GDB. Hyperpwn needs GEF or pwndbg to be loaded in GDB as a backend. Hyperpwn handles… Read More »hyperpwn: provide a flexible debugger UI for GEF and pwndbg

  • « Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 9
  • Next »

Hacker Gadgets

hacking gadgets

Recent Posts

nmapAutomator - Tool To Automate All Of The Process Of Recon/Enumeration

nmapAutomator – Tool To Automate All Of The Process Of Recon/Enumeration

Quark-Engine - An Obfuscation-Neglect Android Malware Scoring System

Quark-Engine – An Obfuscation-Neglect Android Malware Scoring System

Goby: Attack surface mapping

Goby: Attack surface mapping

Malwinx - Just A Normal Flask Web App To Understand Win32Api With Code Snippets And References

Malwinx – Just A Normal Flask Web App To Understand Win32Api With Code Snippets And References

PAKURI - Penetration Test Achieve Knowledge Unite Rapid Interface

PAKURI – Penetration Test Achieve Knowledge Unite Rapid Interface

Hacker Swag

Archives

  • December 2019
  • November 2019
  • October 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Anonymity
  • Botnet
  • Bruteforce
  • Carding
  • Cheatsheets
  • Coding
  • Combo Lists
  • Courses
  • Crime
  • Cross Site Scripting
  • Cryptography
  • CTF
  • Cyber Awareness
  • Darkweb
  • Data Breach
  • Denial of Service
  • Digital forensics
  • Documentary
  • Ebooks
  • Enumeration
  • Evading Anti Virus and Firewalls
  • Fuzzing
  • Gaming
  • Google Hacking
  • h4a
  • Hacker Tools
  • Hacking News
  • Hardware Hacking
  • Incident Response
  • Information Gathering
  • IOT Hacking
  • Keyloggers
  • Malware
  • Malware Analysis
  • MiTM
  • Mobile hacking
  • Open Source
  • Operating Systems
  • Packet Generators
  • Password Lists
  • Payload Creator
  • Penetration Testing
  • Phishing
  • Post Exploitation
  • Ransomware
  • Remote Administration Tools
  • Reverse Engineering
  • Scrapers
  • Self Hosted
  • SIEM
  • SMS Hacking
  • Sniffing and Session Hijacking
  • Social Engineering
  • Social Media
  • Social Media Hacking
  • Spoofing
  • Sql Injection
  • System Administration
  • System Hacking
  • Threat Intelligence
  • TOR
  • Torrents
  • Tricks
  • Voice Changer
  • Voip
  • VPN
  • Vulnerability
  • Vulnerability Scanners
  • Vulnerability Testing
  • Website Hacking
  • Wifi Hacking

About Us

Cybarrior was founded in 2019 and aims to provide the best online security platform for future and expert cyber professionals around the globe.

Partners

  • Haxf4rall
  • Hacker Gadgets
  • Boot People Offline
  • Lanc Remastered
  • PS4 Booter
  • PSN Resolver
  • Rainmeter Skins
  • Xbox One Booter
  • Xbox Resolver

Contact Us

Forward any inquiries or requests to admin@cybarrior.com

Read More
  • Blog
  • Boot Offline
  • Courses
    • Cyber Security School
    • Ethical Hacking Coursers
  • CTF
  • Hacker Gadgets
  • News
  • Security Books
  • Tools Directory
Menu
  • Blog
  • Boot Offline
  • Courses
    • Cyber Security School
    • Ethical Hacking Coursers
  • CTF
  • Hacker Gadgets
  • News
  • Security Books
  • Tools Directory
Hacker Shop
  • Backpacks
  • Blank Cards
  • Buffs & Masks
  • Cables & Adapters
  • Flash Drives
  • Gifts for Hackers
  • Keyloggers
  • Lockpicks
  • Pentesting Equipment
  • Raspberry Pi
  • Software Defined Radio RFID
  • Spy Gadgets
  • Stickers
  • T-Shirts
  • Wifi Adapters
  • Wifi Deauthers
Stay Connected
Facebook
Twitter
Reddit
Youtube

Latest Ebooks

Red Team Field Manual
The Hacker Playbook 3 Practical Guide To Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing
Penetration Testing: A Hands on Introduction to Hacking
Hands-On Penetration Testing on Windows
Hands-on Cybersecurity for Architects
Metasploit Penetration Testing Cookbook - Third Edition
Digital Forensics and Incident Response
The Hacker Playbook
DOTCOM Secrets: The underground Playbook
Reversing Secrets of Reverse Engineering
The Art of Memory Forensics
Hackers: Heroes of the Computer Revolution
Practical Cyber Intelligence
Linux Kernel Development
Cypherpunks: Freedom and the Future of the Internet
The Art of Deception
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
We Are Anonymous
The Basics of Hacking and Penetration Testing
Previous
Next
Do NOT follow this link or you will be banned from the site!
Getting Download Link

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Download Hackers Handbook