gitlab-runner-research: PoC scripts demonstrating abuse of self-hosted GitLab runners and practical hardening and detection guidance. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: gitlab-runner-research – PoC for abusing self-hosted…
Tag: Darknet – Hacking Tools, Hacker News & Cyber Security
mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents
mcp-scanner: Python tool to scan Model Context Protocol servers for prompt injection, jailbreaks, and insecure tool patterns. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: mcp-scanner – Python MCP…
Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
Deepfake-as-a-Service 2025. How voice cloning and synthetic media fraud hit enterprises, with case studies, detection tactics, and CISO actions. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Deepfake-as-a-Service 2025…
Reaper – Unified Application Security Testing with AI Support
Reaper – an open-source AppSec testing framework combining recon, proxying, fuzzing and AI-agent workflows for penetration testers and red teams. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Reaper…
XRayC2 – Weaponizing AWS X-Ray for Covert Command and Control (C2)
XRayC2 shows how AWS X-Ray can be abused as a covert command and control channel. Practical walkthrough, install, attack scenario, detections. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
SetupHijack – Installer and Updater Race Condition Proof of Concept for Local Escalation
SetupHijack is a Windows research tool that races installer and updater drop locations to substitute attacker payloads and achieve elevated execution. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Generative AI in Social Engineering & Phishing in 2025
Explore how generative AI is reshaping phishing in 2025, from deepfake romance frauds to voice deepfakes targeting officials, and what defenders can do now. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read…
RedExt – Browser Extension-Based C2 Framework for Red Team Recon
RedExt turns Chromium into a browser-based C2 agent, collect cookies, DOM, screenshots, clipboard, system data via a Flask server and Chrome extension. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original…
Cybersecurity Workforce Trends in 2025 – Skills Gap, Diversity and SOC Readiness
Explore 2025 cybersecurity workforce shifts, more women entering the field, persistent SOC skill gaps, and training programs that improve retention. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Cybersecurity…
AzureStrike – Offensive Toolkit for Attacking Azure Active Directory Environments
AzureStrike is a red team toolkit for attacking Azure Active Directory, enabling reconnaissance, credential abuse, and persistence in cloud environments. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: AzureStrike…
ChromeAlone – Chromium Browser C2 Implant for Red Team Operations
ChromeAlone turns Chromium into a stealthy C2 implant with credential capture, file access, and persistence. A browser-based alternative to Cobalt Strike. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Darknet Communications in 2025 – From IRC Forums to Telegram Crime Networks
How darknet actors migrated from IRC forums to Telegram networks in 2025. Case studies, takedowns, and evolving criminal communication tools. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Darknet…
LostMyPassword – Dual Use Password Recovery and Credential Dumping Tool
LostMyPassword v1.00 recovers forgotten account passwords, but in red team ops it doubles as a fast post-exploitation credential dumping utility. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: LostMyPassword…
MailSniper – PowerShell Tool for Exchange Mailbox Search and Credential Discovery
MailSniper PowerShell tool for Microsoft Exchange. Search mailboxes for passwords, network intel, and harvest usernames in red team operations. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: MailSniper –…
xsshunter-express – Self-Hosted Blind XSS Payload Capture and Analysis
Self-hosted blind XSS hunter via Docker. Deploy xsshunter‑express in five minutes to capture stealthy XSS payloads with screenshots, DOM dumps, and full context. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the…
Best Kickass (KAT) Alternatives & Live Torrent Trackers in 2025 – Public, Private, and Legal Picks
Best Kickass alternatives and live torrent trackers in 2025. Public, private, and legal sites tested and active, plus safety tips for researchers. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original…
BrainDamage – Payload Generator and Encrypted Shell Stager for Red Teams
Generate and stage encrypted payloads with BrainDamage, a flexible toolkit for red teamers focused on stealth, staging, and remote command delivery. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article:…
Argus – Ultimate Reconnaissance Toolkit for Offensive Recon Operations
Argus reconnaissance toolkit simplifies offensive recon with modular OSINT, DNS, port scan, SSL, and leak detection in one tool. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: Argus –…
CredMaster – Anonymous AWS‑Backed Password Spraying Toolkit
CredMaster enables anonymous password spraying via AWS proxies, rotating IPs, evading throttle, ideal for red teamers and pen testers. This article has been indexed from Darknet – Hacking Tools, Hacker News & Cyber Security Read the original article: CredMaster –…
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
Explore how enterprises are adopting post-quantum cryptography (PQC) using OpenSSL 3.5, hybrid TLS, and NIST-approved algorithms like Kyber and Dilithium. Learn about PQC implementation strategies, compliance timelines, tooling, and real-world deployments by Microsoft, Meta, Red Hat, and others preparing for…