The Blog

Read the latest CyberWorld Updates and News in addition of awesome Tutorials.

JENX BOTNET can get Binded in your GTA 5 Game !

Researchers at Radware have discovered a new botnet that uses vulnerabilities linked with the Satori botnet and is leveraging the Grand Theft Auto videogame community to infect IoT devices. Satori is a derivative of Mirai, the notorious botnet that in 2016 infamously managed to take down Dyn, a DNS hosting provider that supports some of Read more »

RDPY : Hack any RDP with this Tool For Hacking [TUTORIAL + DOWNLOAD]

RDPY is an RDP Security Tool in Twisted Python with RDP Man in the Middle proxy support which can record sessions and Honeypot functionality.     RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client and server side). RDPY is built over the event driven network engine Twisted. RDPY Read more »

Hijacker : Reaver For Android Wifi Hacker App [TUTORIAL + .apk DOWNLOAD]

It offers a simple and easy UI to use these tools without typing commands in a console and copy & pasting MAC addresses. Features of Hijacker Reaver For Android Wifi Hacker App Information Gathering View a list of access points and stations (clients) around you (even hidden ones) View the activity of a specific network Read more »

net-creds : Sniff Passwords from any Application

net-creds is a Python-based tool for sniffing plaintext passwords and hashes from a network interface or PCAP file – it doesn’t rely on port numbers for service identification and can concatenate fragmented packets.     Features of net-creds for Sniffing Passwords It can sniff the following directly from a network interface or from a PCAP Read more »

Crypt and Obfusicate your Payloads with OWASP ZSC [TOOL DOWNLOAD + TUTORIAL]

OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.     Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malware, bypassing antivirus software, obfuscating code for Read more »