Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Category: News

Polish researcher releases new tools that automatically bypass 2FA for phishing attacks

Piotr Duszyński, a Polish security researcher released a new penetration testing tool called Modlishka. This tool makes it easy to automate phishing attacks and even break accounts that are protected by 2FA (two-factor authentication). Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns to the next level (with minimal effort required from […]

New KickAss Torrents (KAT) ~ 2019 Best Torrent Sites (Working)

Good news, the new Kickass Torrents site is back. Back in July 2017, popular BitTorrent site Kickass Torrents (KAT cr) was taken down by the United States authorities. The peer to peer file sharing site became the world’s biggest piracy hub after The Pirate Bay went offline. Now shortly after law enforcement shut down the […]

Ghidra – Free Reverse Engineering Tool Developed by NSA

NSA to release a free reverse engineering tool known as GHIDRA that to demonstrated in the RSA conference 2019 that going to held at Mar 05 in Moscone Center, San Francisco. The reverse engineering tool developed in Java and works with windows, OS X, Linux and mobile devices. To run it requires Java 1.7 to […]

WannaCry ransomware continues to spread and infect after 18 months

The WannaCry ransomware broke out in many countries and regions around the world in the middle of last year, which infected a large number of individuals and business users in a very short time. WannaCry’s massive infection benefited from the eternal blue vulnerability leaked by shadow brokers, although Microsoft released security updates, however many users […]

Tumblr serious vulnerability can reveal everyone information

Tumblr, a well-known blog sharing site, just released a security bulletin to reveal serious security vulnerabilities that have been fixed. A security researcher submitted the security breach through a soup-free bounty hunter program that has been fixed by the company’s engineering team. Anyone can use the vulnerability to view other users’ data without any complicated […]

Top 5 Publicly Available Hacking Tools Mostly used By Hackers

Cyber Criminals are using various malicious tools for cyber attacks based on the target’s strength to infiltrate the sensitive data and more often nowadays Publicly Available Hacking Tools are mainly used by threat actors for various attacks around the world. Today in the cyber worlds hacking tools are openly available with various functionalities and freely […]

Iceland suffered the most serious attack in the history of the country

A few days ago, Iceland in Europe was hit by a large-scale phishing attack initiated by cybercrime groups. Criminal gangs sent phishing emails to tens of thousands of Icelandic users. Eventually, up to 1,000 people were identified, and other personal information was revealed, which is the most significant and most serious cyber attack in Iceland’s […]

Ethical Hacking Tutorials © 2018
Skip to toolbar