HaveIBeenPwned
check if you have already been hacked (passwords and emails) for real
True People Search
search for public records of people, anyone you know, including yourself
Password Manager
use a password manager, it is time (there are many out there, this one is just an example)
YubiKey
the best 2-factor authentication is a physical security key (there are a few out there, this one is just an example)
How Famous YouTubers Get Hacked
an example of AV evasion and a full hack of YouTube channel (Linux Tech tips) for streamjacking
How hackers hack you completely
a DefCon experience of Kevin Roose who let hackers hack him
Hacking Tools Used to Get into an Office
a video talking about stealing key cards through the air, getting into hotel, NFC spoofers
Pentesters Strike Back
a fun video describing pentesting analysis of Star Wars Episode IV
StrandHogg Android Vulnerability
malware that can be disguised as any android app to read SMS, steal photos, hijack social media accounts, GPS location, listen to the microphone, intercept credentials and 2 FA
Hacking an Andoird TV under 2 minutes
a short article about hacking any Android TV with a video at the end
Eavesdropping on Google Home and Alexa
video demos of third-party apps eavesdropping on your conversations without you knowing it
Iron Geek
Video archive of past security conference presentations
Pentesting a Power Grid
16-min video on breaking into a power grid
Danger Drone
compromising a wireless mouse and keyboard on a drone
Protect Ya Passwords
a rapper's view on passwords in a 3-min video
Live Social Engineering
a hack of your phone account through your provider
What is Your Password
Jimmy Kimmel's show: asking for passwords on the street
Dolphin Attack
initiating inaudible voice commands to an iPhone
Rubber Ducky to Bypass Lockscreen
a story about a rubber ducky
Remotely Stealing a Tesla
an attack against a passive keyless entry
DARPA Cyber Grand Challenge
AI supercomputers are hacking each other and patching unknown bugs on the fly
Nzyme
wifi network defense, detects rogues access points, wifi pineapple, tracks wifi hacking devices
PowerHub
PowerShell post exploitation tool helping pentesters transfer data,bypassing endpoint protection - fileless, stateless, obfuscation, AMSI bypass
ZeusCloud
open source cloud security, monitoring, and analysis
Hack Dojo
search engine for security papers and conferences
Lumos
an app that identifies wireless devices' location by just walking around the area in augmented reality
CloudFox
situational awareness in cloud environments for pentesters
Arsenal
quick inventory and launcher for hacking programs in Linux; helps to remember pentest commands
Nidhogg
all-in-one simple to use rootkit for red teams
HOUDINI
Hundreds of Offensive and Useful Docker Images for Network Intrusion
Ddosify
high-performance load testing tool, written in Golang, dos, ddos
Netz
automatically discover Internet-wide misconfigurations (ex. on AWS runs for 10 mins with 4 NICs and scans the whole Internet)
BruteShark
Network forensic analysis tool: password extractiion, build a network map, reconstruct TCP sessions, extract hashes and DNS queries, file carving
Traitor
automatic Linux privilege escalation via exploitation like GTFObins
Teler
simple and easy to use real-time HTTP intrusion detection system that reads in logs and provides information about attacks
PEASS
privilege escalation awesome scripts suite with colors
Assetnote Wordlists
custom-made wordlists for subdomain enumeration
Rustscan
a fast scanner of ports (65K ports in 3 seconds) written in Rust and using some of the nmap features
TunyCheck
captures traffic from any device (e.g., mobile) to automatically analyze suspicious activities happening on that device
GTFOBins
Unix binaries that can be exploited by an attacker to bypass local security restriction
Ciphey
fully automated decryption tool using natural language processing and artificial intelligence
Infection Monkey
open source Breach and Attack Simulation (BAS) tool with post-breach attacks and lateral movement
Web Sandbox for Malware Analysis
Joe Sandbox detects and analyzes files and URLs for suspicious activities, comprehensive dynamic/static analysis report
Tsunami Vulnerability Scanner
network security scanner, able to detect high severity vulnerabilities, based on nmap and ncrack, developed by Google
Wardriving
captured WiFi networks around the globe
Modlishka
the most dangerous phishing tool that acts as a smart reverse proxy
MASSCAN
Mass IP port scanner - can scan entire Internet in under 6 minutes
Hacking The Cloud
encyclopedia of tactics and techniques to attack cloud systems: AWS, Azure, GCP
Epic Twitter Hack Explained
social engineering, email swapping, and many bitcoins later in a massive twitter hack of well-known people
Critical Infrastructure Intelligence Gathering
using tools to analyze and access cameras, printers, and Industrial Control Systems (ICS)/SCADA infrastructure terminals
Phishing Users Walk-Through
evilginx is deployed on AWS to capture username & password and EditThisCookie is used to bypass 2FA
State Hackers Use IoT to Breach Networks
hackers break into IoT devices, commonly through default passwords, and compromise networks through them
Instagram $30K Bug Bounty hack
a researcher found a vulnerability on Instagram, earning $30K as a bug bounty
Tricking Cylance's AI Antivirus
shows how simple it could be to bypass antivirus with AI and still run malware
Car Hacking at DefCon
a car hacking village
SIM Hijackers
sophisticated attacks using just phone numbers via SIM hijacking
Creative Phishing
a write-up about a very creative phishing attack on Steam and others
Vigilante Botnet
a botnet that removes another cryptocurrency malware
Naked Security
attackers breached a bank through a LinkedIn job ad and Skype call
Spying with Raspberry Pi
a Raspberry Pi was found in the network closet
Twitter was Broken
how Twitter was broken because of SMS
Cybersecurity Horror Stories
real stories from red and blue teams
One Laptop Leads to a Full Pwn
a laptop used in a coffee shop led to a full network attack
Drone Hacks
a list of vulnerable drones and attack tools
Voicemail Attack on WhatsApp
attackers used voicemail hack to steal WhatsApp accounts
Security Keys
a story about how Google used security keys to defeat phishing
Reddit Hack
SMS 2FA verification codes were intercepted, leading to the Reddit hack