All Posts
2026
Your iPhone Just Got Owned: iOS WebKit Zero-Days Require No Click (CVE-2025-43529)
01-1252-Year-Old Unix Tape Reveals the Same Buffer Overflow We're Still Making Today
01-11Ni8mare: n8n Vulnerability Gives Full Admin Access with One HTTP Header Change
01-10Notion AI Leaks Data Before You Click OK: Prompt Injection Hits 100 Million Users
01-08Malicious Chrome Extensions Steal ChatGPT Conversations from 900,000 Users
01-08Fake Blue Screen of Death Installs $5 RAT Malware via ClickFix Attack
01-06European Space Agency Hacked: 200GB Stolen in 7 Days, Data Sold on FBI Honeypot
01-05Kimwolf Botnet: 2 Million Android TV Boxes Hacked via Proxy App Vulnerability
01-0416-Year-Old's AI Finds Heap Buffer Overflow in FFmpeg EXIF Parser
01-0370 Million Bluetooth Chips Have a Backdoor: Sony, Bose, JBL Headphones at Risk
01-02RondoDox Botnet: 56 Exploits, Gaming Traffic Disguise, and Self-Defense Against Recovery
01-012025
libsodium Gets First CVE After 13 Years: The Two-Line Fix
12-31WIRED Magazine Hacked: 2.3 Million Records Leaked via Basic IDOR Vulnerability
12-30Rainbow Six Siege Hacked: $339 Trillion in Fake Credits, Streamers Banned, CEO Mocked
12-29MongoBleed: 87,000 MongoDB Servers Leaking Memory Like Heartbleed
12-28Fortinet Authentication Bypass: A 5-Year-Old Bug Returns While a New One Gets Exploited in 3 Days
12-27Fake GitHub Exploits Target Security Researchers: Download a PoC, Get Malware
12-26Apple Approved It: MacSync Stealer Bypasses Notarization to Infect Hundreds of Macs
12-25Malicious npm Package Stole WhatsApp Messages for 6 Months: 56,000 Downloads
12-24Exploit Eye - CVE and Vulnerability Search Tool for Ethical Hackers
11-18Your Router Just Failed: ASUS & TP-Link Critical Vulnerabilities (CVE-2025-59367)
11-16Your Smart TV is spying on you, and most people don't know. But YOU will!
11-15Your Docker container? It just walked right out the front door.
11-13Your Windows Kernel Has a Race Condition Being Exploited Right Now
11-12Ethical Hacking Course Zero to Expert
10-022024
Darkwebeye - Explore the Unseen Depths of the Internet
06-15Clear Your Tracks on Linux
01-152023
Hands-On Guide to Wireshark and Tshark: A Deep Dive into Network Analysise
11-21Why Your Dns Settings Could Make or Break Your Hacking Career
10-22Ethical Hacking Techniques With SSH Secure Tunnels and Data Transfers
10-122022
Dorks Eye | Google Hacking, Dorks Scraping an Searching Script
04-25Twitter Information Gathering Tool
04-032021
Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release
04-26mosint An automated email OSINT tool
04-22Maigret OSINT Username Checker
04-072020
Glances System Monitor Tool an Eye on Your System
09-01Wildcards Understanding and Using for Hacking
08-25How to Hack Exploit Windows Using Metasploit Beginners Guide
08-20Create bootable (USB) Drive fast
08-06Install Anarchy Linux for Penetration Testing and Ethical Hacking
07-26Learn Linux Through Man Pages
07-19My Complete Atom Setup Tutorial
07-11How to Install Kali Linux 2020 2
07-08Red Hawk Information Gathering Vulnerability Scanner and Crawling
06-04Who Would Put a Printer on the Internet
06-03Hfish a Honeypot Platform
05-31Determine if Your Linux Computer or Server Is Hacked
05-06Blackarch Linux Penetration Testing 2020 01 01 Complete Install
04-19Inhale Malware Analysis Classification Tool
04-15Tentacle a Poc Vulnerability Verification and Exploit Framework
04-05Fsociety Hacking Tools Pack a Mr Robot Penetration Testing Framework
04-04Shodan Command Line a Step by Step Walkthrough
03-24Xspear Powerful Xss Scanner
03-17XCTR Hacking Tools All in One Tool for Information Gathering
03-05Maltrail Malicious Traffic Detection System
03-01How to Hack and Exploit Printers in Seconds
02-23How to Install Windows 10 on Virtualbox
02-16Ipdump Generate a Report for Hostname Ip Address Url or Domain
02-10Install Tor on Windows Kali Linux and Search the Dark Web
02-08Install Kali Linux 2020 1 on Virtualbox
02-04Dark Eagle Tool for Information Gathering and Vulnerability Scanning
01-31Security Webcam Hacking Way Too Easy
01-27Windows 7 Reasons to Upgrade to Linux
01-09Blue Eye a Python Recon Toolkit
01-04The best vulnerable websites to improve your hacking skills
01-022019
Shodan Eye Ethical Hacking Tool Release
12-30Wi Ploit Wi Fi Exploit Tool
12-27Getting Started With Ghost Eye
11-01Best Operating System for Ethical Hacking and Pentesting
10-17Android Hacking with Termux
10-09Best Linux Commands Hacks and Other Cool Tricks for Beginners
09-06Google Dorks an Easy Way of Hacking
09-04How to Use Nmap Nse Scripts to Find Vulnerabilities
08-30Shodan Eye Getting Started With Shodan
08-262018
Cr3dov3r Credential Reuse Attack
09-30Infernal Twin Infernal Wireless V3 Automated Wireless Hacking
09-24Reverse Backdoor for Linux Windows and Mac
09-13Arp Spoofer Detector for Linux and Windows
09-01