RWMC: el "Mimikatz" de Powershell para Windows RWMC: el "Mimikatz" de Powershell para Windows Reviewed by Zion3R on 21:51 Rating: 5
p0wnedShell - PowerShell Runspace Post Exploitation Toolkit p0wnedShell - PowerShell Runspace Post Exploitation Toolkit Reviewed by Zion3R on 18:33 Rating: 5
Zizzania - Automated DeAuth Attack Zizzania - Automated DeAuth Attack Reviewed by Zion3R on 17:45 Rating: 5
Vídeos de muchas conferencias de seguridad de 2015 Vídeos de muchas conferencias de seguridad de 2015 Reviewed by Zion3R on 19:33 Rating: 5
3 Formas de Capturar las Contraseñas HTTP a través de la Red 3 Formas de Capturar las Contraseñas HTTP a través de la Red Reviewed by Zion3R on 16:31 Rating: 5
WiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack WiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack Reviewed by Zion3R on 19:12 Rating: 5
Escalar Privilegios en Windows Utilizando Servicios Mal Configurados Escalar Privilegios en Windows Utilizando Servicios Mal Configurados Reviewed by Zion3R on 15:30 Rating: 5
Escalar privilegios en Windows 7, 8, 10, Server 2008, Server 2012 con Hot Potato Escalar privilegios en Windows 7, 8, 10, Server 2008, Server 2012 con Hot Potato Reviewed by Zion3R on 21:00 Rating: 5
[CVE-2015-8605] Denegación de servicio en DHCP de ISC [CVE-2015-8605] Denegación de servicio en DHCP de ISC Reviewed by Zion3R on 20:54 Rating: 5
SimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On SimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On Reviewed by Zion3R on 19:36 Rating: 5
Seguridad en Cajeros Automáticos ATM Seguridad en Cajeros Automáticos ATM Reviewed by Zion3R on 19:42 Rating: 5
Servidores OpenSSH Maliciosos Roban Claves Privadas Servidores OpenSSH Maliciosos Roban Claves Privadas Reviewed by Zion3R on 15:28 Rating: 5
Killchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks Killchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks Reviewed by Zion3R on 15:20 Rating: 5
¡El Infierno ha vuelto! (legionhiden4dqh4.onion) ¡El Infierno ha vuelto! (legionhiden4dqh4.onion) Reviewed by Zion3R on 23:00 Rating: 5
[CVE-2016-0931 al CVE-2016-0947] Actualizaciones de seguridad para Adobe Acrobat y Reader [CVE-2016-0931 al CVE-2016-0947] Actualizaciones de seguridad para Adobe Acrobat y Reader Reviewed by Zion3R on 22:45 Rating: 5
BSQLinjector - Blind SQL Injection Exploitation Tool BSQLinjector - Blind SQL Injection Exploitation Tool Reviewed by Zion3R on 9:30 Rating: 5
Microsoft publica 10 boletines de seguridad y finaliza soporte de Internet Explorer 8, 9 y 10 Microsoft publica 10 boletines de seguridad y finaliza soporte de Internet Explorer 8, 9 y 10 Reviewed by Zion3R on 21:23 Rating: 5
Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo Reviewed by Zion3R on 20:36 Rating: 5
Backdoor para acceder por SSH a los Firewalls de Fortinet, FortiGate 4.x a 5.0.7 Backdoor para acceder por SSH a los Firewalls de Fortinet, FortiGate 4.x a 5.0.7 Reviewed by Zion3R on 20:02 Rating: 5
Cómo Controlar El Vibrador Del Móvil Con HTML5 Cómo Controlar El Vibrador Del Móvil Con HTML5 Reviewed by Zion3R on 19:37 Rating: 5
Hackazon - A Modern Vulnerable Web App Hackazon - A Modern Vulnerable Web App Reviewed by Zion3R on 17:30 Rating: 5
Miles De Ucranianos Sin Electricidad Gracias A Un Malware Miles De Ucranianos Sin Electricidad Gracias A Un Malware Reviewed by Zion3R on 15:13 Rating: 5
Blade - Webshell En Python Para Evadir WAF Blade - Webshell En Python Para Evadir WAF Reviewed by Zion3R on 12:30 Rating: 5
Actualización de seguridad para QuickTime Actualización de seguridad para QuickTime Reviewed by Zion3R on 9:30 Rating: 5
SAML Raider - SAML2 Burp Extension SAML Raider - SAML2 Burp Extension Reviewed by Zion3R on 14:40 Rating: 5
Códigos para ingresar a todas las listas en Netflix Códigos para ingresar a todas las listas en Netflix Reviewed by Zion3R on 16:10 Rating: 5
Maltrail - Malicious Traffic Detection System Maltrail - Malicious Traffic Detection System Reviewed by Zion3R on 15:10 Rating: 5
Cómo obtener acceso no autorizado en un PC remoto usando Metasploit Cómo obtener acceso no autorizado en un PC remoto usando Metasploit Reviewed by Zion3R on 16:30 Rating: 5
Kali NetHunter 3.0 - Android Mobile Penetration Testing Platform Kali NetHunter 3.0 - Android Mobile Penetration Testing Platform Reviewed by Zion3R on 15:00 Rating: 5
Winpayloads - Undetectable Windows Payload Generation Winpayloads - Undetectable Windows Payload Generation Reviewed by Zion3R on 12:36 Rating: 5
Se iniciará programa de recompensas de errores (bug bounty program) para el navegador Tor  Se iniciará programa de recompensas de errores (bug bounty program) para el navegador Tor Reviewed by Zion3R on 12:30 Rating: 5
[CVE-2015-8669] Revelación de la ruta completa donde phpMyAdmin se encuentra instalado [CVE-2015-8669] Revelación de la ruta completa donde phpMyAdmin se encuentra instalado Reviewed by Zion3R on 0:30 Rating: 5
DHCPwn: (otra) herramienta para saturar DHCPs DHCPwn: (otra) herramienta para saturar DHCPs Reviewed by Zion3R on 20:07 Rating: 5
Sawef - Send Attack Web Forms Sawef - Send Attack Web Forms Reviewed by Zion3R on 17:30 Rating: 5
IPTV Brute-Force - Search And Brute Force Illegal IPTV Server IPTV Brute-Force - Search And Brute Force Illegal IPTV Server Reviewed by Zion3R on 14:09 Rating: 5
Denegación de servicio en Cisco IOS XR Denegación de servicio en Cisco IOS XR Reviewed by Zion3R on 10:33 Rating: 5
Vuvuzela - Private Messaging System That Hides Metadata Vuvuzela - Private Messaging System That Hides Metadata Reviewed by Zion3R on 19:12 Rating: 5
Fugas de Información en los Routers Mikrotik Fugas de Información en los Routers Mikrotik Reviewed by Zion3R on 16:59 Rating: 5