RWMC: el "Mimikatz" de Powershell para Windows RWMC: el "Mimikatz" de Powershell para Windows Reviewed by Lydecker Black on 21:51 Rating: 5
p0wnedShell - PowerShell Runspace Post Exploitation Toolkit p0wnedShell - PowerShell Runspace Post Exploitation Toolkit Reviewed by Lydecker Black on 18:33 Rating: 5
Zizzania - Automated DeAuth Attack Zizzania - Automated DeAuth Attack Reviewed by Lydecker Black on 17:45 Rating: 5
Vídeos de muchas conferencias de seguridad de 2015 Vídeos de muchas conferencias de seguridad de 2015 Reviewed by Lydecker Black on 19:33 Rating: 5
3 Formas de Capturar las Contraseñas HTTP a través de la Red 3 Formas de Capturar las Contraseñas HTTP a través de la Red Reviewed by Lydecker Black on 16:31 Rating: 5
WiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack WiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack Reviewed by Lydecker Black on 19:12 Rating: 5
Escalar Privilegios en Windows Utilizando Servicios Mal Configurados Escalar Privilegios en Windows Utilizando Servicios Mal Configurados Reviewed by Lydecker Black on 15:30 Rating: 5
Escalar privilegios en Windows 7, 8, 10, Server 2008, Server 2012 con Hot Potato Escalar privilegios en Windows 7, 8, 10, Server 2008, Server 2012 con Hot Potato Reviewed by Lydecker Black on 21:00 Rating: 5
[CVE-2015-8605] Denegación de servicio en DHCP de ISC [CVE-2015-8605] Denegación de servicio en DHCP de ISC Reviewed by Lydecker Black on 20:54 Rating: 5
SimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On SimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On Reviewed by Lydecker Black on 19:36 Rating: 5
Seguridad en Cajeros Automáticos ATM Seguridad en Cajeros Automáticos ATM Reviewed by Lydecker Black on 19:42 Rating: 5
Servidores OpenSSH Maliciosos Roban Claves Privadas Servidores OpenSSH Maliciosos Roban Claves Privadas Reviewed by Lydecker Black on 15:28 Rating: 5
Killchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks Killchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks Reviewed by Lydecker Black on 15:20 Rating: 5
¡El Infierno ha vuelto! (legionhiden4dqh4.onion) ¡El Infierno ha vuelto! (legionhiden4dqh4.onion) Reviewed by Lydecker Black on 23:00 Rating: 5
[CVE-2016-0931 al CVE-2016-0947] Actualizaciones de seguridad para Adobe Acrobat y Reader [CVE-2016-0931 al CVE-2016-0947] Actualizaciones de seguridad para Adobe Acrobat y Reader Reviewed by Lydecker Black on 22:45 Rating: 5
BSQLinjector - Blind SQL Injection Exploitation Tool BSQLinjector - Blind SQL Injection Exploitation Tool Reviewed by Lydecker Black on 9:30 Rating: 5
Microsoft publica 10 boletines de seguridad y finaliza soporte de Internet Explorer 8, 9 y 10 Microsoft publica 10 boletines de seguridad y finaliza soporte de Internet Explorer 8, 9 y 10 Reviewed by Lydecker Black on 21:23 Rating: 5
Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo Reviewed by Lydecker Black on 20:36 Rating: 5
Backdoor para acceder por SSH a los Firewalls de Fortinet, FortiGate 4.x a 5.0.7 Backdoor para acceder por SSH a los Firewalls de Fortinet, FortiGate 4.x a 5.0.7 Reviewed by Lydecker Black on 20:02 Rating: 5
Cómo Controlar El Vibrador Del Móvil Con HTML5 Cómo Controlar El Vibrador Del Móvil Con HTML5 Reviewed by Lydecker Black on 19:37 Rating: 5
Hackazon - A Modern Vulnerable Web App Hackazon - A Modern Vulnerable Web App Reviewed by Lydecker Black on 17:30 Rating: 5
Miles De Ucranianos Sin Electricidad Gracias A Un Malware Miles De Ucranianos Sin Electricidad Gracias A Un Malware Reviewed by Lydecker Black on 15:13 Rating: 5
Blade - Webshell En Python Para Evadir WAF Blade - Webshell En Python Para Evadir WAF Reviewed by Lydecker Black on 12:30 Rating: 5
Actualización de seguridad para QuickTime Actualización de seguridad para QuickTime Reviewed by Lydecker Black on 9:30 Rating: 5
SAML Raider - SAML2 Burp Extension SAML Raider - SAML2 Burp Extension Reviewed by Lydecker Black on 14:40 Rating: 5
Códigos para ingresar a todas las listas en Netflix Códigos para ingresar a todas las listas en Netflix Reviewed by Lydecker Black on 16:10 Rating: 5
Maltrail - Malicious Traffic Detection System Maltrail - Malicious Traffic Detection System Reviewed by Lydecker Black on 15:10 Rating: 5
Cómo obtener acceso no autorizado en un PC remoto usando Metasploit Cómo obtener acceso no autorizado en un PC remoto usando Metasploit Reviewed by Lydecker Black on 16:30 Rating: 5
Kali NetHunter 3.0 - Android Mobile Penetration Testing Platform Kali NetHunter 3.0 - Android Mobile Penetration Testing Platform Reviewed by Lydecker Black on 15:00 Rating: 5
Winpayloads - Undetectable Windows Payload Generation Winpayloads - Undetectable Windows Payload Generation Reviewed by Lydecker Black on 12:36 Rating: 5
Se iniciará programa de recompensas de errores (bug bounty program) para el navegador Tor  Se iniciará programa de recompensas de errores (bug bounty program) para el navegador Tor Reviewed by Lydecker Black on 12:30 Rating: 5
[CVE-2015-8669] Revelación de la ruta completa donde phpMyAdmin se encuentra instalado [CVE-2015-8669] Revelación de la ruta completa donde phpMyAdmin se encuentra instalado Reviewed by Lydecker Black on 0:30 Rating: 5
DHCPwn: (otra) herramienta para saturar DHCPs DHCPwn: (otra) herramienta para saturar DHCPs Reviewed by Lydecker Black on 20:07 Rating: 5
Sawef - Send Attack Web Forms Sawef - Send Attack Web Forms Reviewed by Lydecker Black on 17:30 Rating: 5
IPTV Brute-Force - Search And Brute Force Illegal IPTV Server IPTV Brute-Force - Search And Brute Force Illegal IPTV Server Reviewed by Lydecker Black on 14:09 Rating: 5
Denegación de servicio en Cisco IOS XR Denegación de servicio en Cisco IOS XR Reviewed by Lydecker Black on 10:33 Rating: 5
Vuvuzela - Private Messaging System That Hides Metadata Vuvuzela - Private Messaging System That Hides Metadata Reviewed by Lydecker Black on 19:12 Rating: 5
Fugas de Información en los Routers Mikrotik Fugas de Información en los Routers Mikrotik Reviewed by Lydecker Black on 16:59 Rating: 5