Heisenberg Dependency Health Check is a GitHub Action that flags risky or newly introduced dependencies in pull requests using supply-chain signals. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Category: Darknet – Hacking Tools, Hacker News & Cyber Security
Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting
Dark web search engines in 2025 and how enterprises use monitoring, APIs and IOC hunting to detect credential leaks, impersonation and supply chain exposure. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read…
mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers
mcp-scan is a dynamic proxy and guardrail monitor for MCP servers, providing real-time traffic inspection and enforcement for agents and tools. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool
Reconnoitre automates network reconnaissance and service enumeration for penetration testers and red teams using structured, repeatable workflows. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Reconnoitre – Open-Source Reconnaissance…
Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit
Scanners-Box is an open-source reconnaissance and scanning toolkit for red teams and security researchers. Curated collection of scanners and recon utilities. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Red Teaming LLMs 2025 – Offensive Security Meets Generative AI
Offensive red teaming of large language models (LLMs) in 2025 – actionable tactics, case studies, and CISO controls for GenAI risk This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
gitlab-runner-research – PoC for abusing self-hosted GitLab runners
gitlab-runner-research: PoC scripts demonstrating abuse of self-hosted GitLab runners and practical hardening and detection guidance. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: gitlab-runner-research – PoC for abusing self-hosted…
mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents
mcp-scanner: Python tool to scan Model Context Protocol servers for prompt injection, jailbreaks, and insecure tool patterns. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: mcp-scanner – Python MCP…
Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
Deepfake-as-a-Service 2025. How voice cloning and synthetic media fraud hit enterprises, with case studies, detection tactics, and CISO actions. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Deepfake-as-a-Service 2025…
Reaper – Unified Application Security Testing with AI Support
Reaper – an open-source AppSec testing framework combining recon, proxying, fuzzing and AI-agent workflows for penetration testers and red teams. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Reaper…
XRayC2 – Weaponizing AWS X-Ray for Covert Command and Control (C2)
XRayC2 shows how AWS X-Ray can be abused as a covert command and control channel. Practical walkthrough, install, attack scenario, detections. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
SetupHijack – Installer and Updater Race Condition Proof of Concept for Local Escalation
SetupHijack is a Windows research tool that races installer and updater drop locations to substitute attacker payloads and achieve elevated execution. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Generative AI in Social Engineering & Phishing in 2025
Explore how generative AI is reshaping phishing in 2025, from deepfake romance frauds to voice deepfakes targeting officials, and what defenders can do now. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read…
RedExt – Browser Extension-Based C2 Framework for Red Team Recon
RedExt turns Chromium into a browser-based C2 agent, collect cookies, DOM, screenshots, clipboard, system data via a Flask server and Chrome extension. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original…
Cybersecurity Workforce Trends in 2025 – Skills Gap, Diversity and SOC Readiness
Explore 2025 cybersecurity workforce shifts, more women entering the field, persistent SOC skill gaps, and training programs that improve retention. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Cybersecurity…
AzureStrike – Offensive Toolkit for Attacking Azure Active Directory Environments
AzureStrike is a red team toolkit for attacking Azure Active Directory, enabling reconnaissance, credential abuse, and persistence in cloud environments. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: AzureStrike…
ChromeAlone – Chromium Browser C2 Implant for Red Team Operations
ChromeAlone turns Chromium into a stealthy C2 implant with credential capture, file access, and persistence. A browser-based alternative to Cobalt Strike. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Darknet Communications in 2025 – From IRC Forums to Telegram Crime Networks
How darknet actors migrated from IRC forums to Telegram networks in 2025. Case studies, takedowns, and evolving criminal communication tools. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Darknet…
LostMyPassword – Dual Use Password Recovery and Credential Dumping Tool
LostMyPassword v1.00 recovers forgotten account passwords, but in red team ops it doubles as a fast post-exploitation credential dumping utility. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: LostMyPassword…
MailSniper – PowerShell Tool for Exchange Mailbox Search and Credential Discovery
MailSniper PowerShell tool for Microsoft Exchange. Search mailboxes for passwords, network intel, and harvest usernames in red team operations. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: MailSniper –…