Tools Category

Browser Exploitation Framework (BeEF)

  BeEF is short for The Browser Exploitation Framework. it’s a testing tool designed to enable penetration testers to launch client-side attacks against target browsers. By using techniques similar to common drive-by malware, testers can assess the security of a target’s internal environment, bypassing the hardened perimeter. Growing concerns about Read more…

 228 total views


Malware & Rootkit detection on Linux   Although the Linux system can be protected from the spread of most malware, it is not absolutely safe. If your data center erected a Linux server, especially the Web server, you should be on the rootkit Trojans and malicious software to prevent, because Read more…

 193 total views

Microsoft: Fireball Malware Isn’t As Dangerous As WannaCry

Here’s How To Stay Safe Short Bytes: Microsoft has released some details on the Fireball malware, which was initially reported by Check Point researchers. Microsoft has pointed out that malware’s magnitude of the threat has been overblown. The company has also listed some precautionary methods to help the customers ensure their security. Earlier Read more…

 122 total views,  1 views today


TheFatRat a Massive Exploiting Tool Revealed An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this Read more…

 200 total views

Tools Category


MalwareSearch A Command Line Tool To Find Malwares   Tool developed for searching malwares at by command line, allowing specific malware download by shell. Soon we’ll input more sources like MalShare, MalwareBlacklist,’s AVCaesar and Malwr. Usage Optional Arguments: $ [–h HELP] [-f FIND] [-w WRITE] usage: Read more…

 121 total views,  1 views today

Microsoft Malware Protection Engine Remote Code Execution Vulnerability

Microsoft Malware Protection Engine Remote Code Execution Vulnerability (CVE-2017-0290)   Vulnerability identify CVE-2017-0290 Vulnerability Finder Natalie Silvanovich and Tavis Ormandy of Google Project Zero Vulnerability An attacker who successfully exploited this vulnerability could execute arbitrary code under the LocalSystem account and control the system. An attacker could install a program; Read more…

 146 total views