Hello DNA Community,
Today I have uploaded the Harley-Davidson Data Breach for you to download, thanks for reading and enjoy!
Revenue: $5.5 Billion
Harley-Davidson (HD) is an American motorcycle manufacturer founded in 1903.
In December 2024, Harley-Davidson suffered a data...
Hello DNA Community,
Today I have uploaded the Restorecord Database for you to download, thanks for reading and enjoy!
This is the database of restorecord.com
Format: csv
Lines: 840K
Compromised Data :
no,discordid,discordname,ipaddress,date
Sample :
Code...
Hello DNA Community,
Today I have uploaded the Oracle Data Breach for you to download, thanks for reading and enjoy!
Oracle Corporation is an American multinational computer technology company headquartered in Austin, Texas.
In September 2024, Oracle suffered a small data breach from a third...
In mid-2018, the fashion shopping site HauteLook was among a raft of sites that were breached and their data then sold in early-2019. The data included over 28 million unique email addresses alongside names, genders, dates of birth and passwords stored as bcrypt hashes.
Who is HauteLook...
HostAfrica data leak
HostAfrica was founded in 2015 in Cape Town with the mission to provide high-performance servers and hosting services in South Africa at a reasonable price. HostAfrica is based in Cape Town, South Africa
sample:
Code:
facilities@seacom.com User Seacom Shared...
SudoDragon
Thread
cybersecurity
data leak
database breach
hack incident
hostafrica.co.za download
CANVA.com database
In May 2019, the graphic design tool website Canva suffered a data breach that impacted 137 million subscribers. The exposed data included email addresses, usernames, names, cities of residence and passwords stored as bcrypt hashes for users not using social logins...
iabaustralia.com.au Database
Hello everyone. Today i uploaded the database of Home
Used by 700 companys including Google, Tiktok, Spotify and more
Format - .csv
Date: 2023
Lines 4.4K
includes...
Hi all,
the Cl0p group has started to post some files as torrents, probably because their onion site can't keep up.
Their onion site is : http://toznnag5o3ambca56s2yacteu7q7x2avr...sad.onion/
This is the list of magnet links so far (but will be out of date soon enough)...
site: zacks.com
"Zacks is the leading investment research firm focusing on stock research, analysis and recommendations."
format: SQL
size: 2Giga
Sample
Code...
2fast4u Database -
Download! 20 December 2017, password md5salt
In December 2017, the Belgian motorcycle forum 2fast4u discovered a data breach of their system.
The breach of the vBulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5...
https://anonfiles.ch/s/ywKUVwQffvW
naturalvision.it
site: Rasterbrille di Natural Vision: occhiali a foro stenopeico
date: 06-2023
format: txt
row: 5300
sample:
Name surname CAP Province Stato Tel Email
ILARIA CALVITTI 00136 RM Italy 3383673414...
Hello DNA Community,
Today I have uploaded the Institute of Space Technologies Pakistan Leak for you to download, thanks for reading and enjoy!
Institute of Space Technologies (www.ist.edu.pk ) Pakistan Leak
About :
SIZE : 197.77 GB
Zip Password : OSINT_without_borders
Torrent File...
the Harley-Davidson Data Breach
Harley-Davidson is an American motorcycle manufacturer founded in 1903.
In December 2024, Harley-Davidson suffered a data breach which led to the exposure of 66.7k rows of customer data.
Breached by 888
Compromised Data :
First Name, Last...
Burp Suite Professional 2024
Burp Suite is a platform for conducting web application security audits. It contains tools for creating a web application map, searching for files and folders, modifying requests, fuzzing, password selection, and much more. There is also a BApp store, which...
ejercito.mil.ve leak
A few vulnerabilities were found, one of them was used to access the internal database of the server which holds Full Names, emails, addresses, credentials, passwords and others on more than 1 million rows from military and government employees.
Breached by ctf and Valerie...
"Paysign is a nationally recognized card payment solutions provider and integrated payment processor."
The data contains the Full names of customers, address, date of birth, phone number and account balance.
Sample...
Alpha Capital Gr oup Leak
alphacapitalgroup.uk
In June 2024, the t rading firm Alpha Capital Gr oup suffered a data breach which resulted in 240,646 records of data getting exposed.
The Compromised Data Includes:
Payment ID, Transaction ID, User ID Email, Payment Type, Amount In...
In February 2018, the diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes.
Breach date: 1 February 2018 Compromised accounts: 143,606,147...
In June 2024, Heineken suffered a data breach from a third party that exposed 8,174 employees from several countries.
The Compromised Data Includes:
IDs, User IDs, Full Names, Email Addresses, Company and Roles.
1558,CAMDED01,Dom Camden,dominic.camden@heineken.co.uk,Heineken,Warehouse Team...
Presenting a premium cybersecurity tool suite designed for sophisticated operations. This 2025 release includes phishing kits, ransomware, keyloggers, trojans, and RCS exploit kits, each rigorously tested for maximum efficacy. This suite delivers unparalleled results for targeted campaigns...
Learn Python & Ethical Hacking from Scratch
Hidden content
Note :- (Practical Videos) Sharing a whole Course of python and How to write our own Scripts & Tools.
BASICS OF ETHICAL HACKING CORE TRAINING
TOPICS
1. The Truth About Living in a Technology Based World
2. Overview of the CEH Certification Program
3. How to Build a Lab to Hack Safely
4. Installing and Configuring Your Windows Server VMs
5. Installing and Configuring Your Desktop VMs
6...
Nightmare
Thread
cybersecurity
ethical hacking
hacking skills
information security
penetration testing
white hat hacking
1/ Hacking is a term that often conjures images of cybercrime, but it's essential to distinguish between malicious activities and ethical hacking. Ethical hackers use their skills to identify and fix vulnerabilities, making the digital world more secure. Let's explore the different facets of...
Nightmare
Thread
cybersecurity
data breach
digital forensics
ethical hacking
network security
vulnerability assessment
An unpatched high-severity security flaw has been disclosed in the open-source RainLoop web-based email client that could be weaponized to siphon emails from victims’ inboxes.
Tracked as CVE-2025-29360, the flaw relates to a stored cross-site-scripting vulnerability impacting the latest...
Nightmare
Thread
cybersecurity
data breach
hacker attack
rainloop vulnerability
webmail security
The Complete Mobile Ethical Hacking Course
What you’ll learn
Mobile Cyber Security for Mobile Applications & Devices
Mobile Applications and Games Penetration Tests
Mobile Device Penetration Tests
Android & iOS Fundamentals
Java & Swift Fundamentals
Ethical Hacking Fundamentals
Reverse...
Nightmare
Thread
cybersecurity
ethical hacking
mobile hacking
mobile security
penetration testing
This is my own personal list that I have of useful websites so I will share them.
Useful Websites:
https://paywithmoon.com
https://paycrypt.ml - Exchange PayPal to LTC with only 5% Fee
https://auto.creavite.co - Make free banners, pfp etc
https://fixedfloat.com/ - Exchange...
BackBox is a Ubuntu-based distro developed for penetration testing and security assessment.
BackBox has its software repository that provides the latest stable versions of various system & network analysis toolkits and the most popular ethical hacking tools. Designed with minimalism in mind and...
Nightmare
Thread
backbox os
cybersecurity
ethical hacking
network security
penetration testing
About
● Android Hacking
● Full Access Mode
● Hack Using Termux
installation Commands :-
apt update
apt upgrade
pkg install git
git clone https://github.com/alvinbaby/JINNRAT
ls
cd JINNRAT
ls
bash setup.sh
Then click 3 after installation done after click 1 copy link I'd...
Using Linux distros for pen testing allows cybersecurity professionals to play a significant role in keeping companies safe. For example, research indicates retail applications are almost three times less secure than those in other sectors.
ArchStrike is an excellent option for ethical hackers...
Nightmare
Thread
cybersecuritycybersecurity tools
ethical hacking
linux distribution
penetration testing
BlackArch is a top Linux distribution that is focused on penetration testing and is common among security researchers and ethical hackers . It is based on Arch Linux and allows you to install BlackArch components on top of it.
One of its most outstanding features is its repository with...
Nightmare
Thread
blackarch
cybersecurity
ethical hacking
latest version
linux distribution
penetration testing
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Let's make it the biggest resource repository for our community.
Learning the Skills
Name
Description
CS 642: Intro to Computer Security
academic content, full semester course, includes...
Ever thought of creating a library with thousands of free hacking an security e-books? You’d never have to spend a dime. It sounds impossible, but it’s not! Free E-books, on nearly all topics you can think of, are all over the internet, ready to be read, downloaded, and shared. All you need to...
Nightmare
Thread
cyberattacks
cybersecurity
digital security
e-books
hacking techniques
This is my own personal list that I have of useful websites so I will share them.
Useful Websites:
https://paywithmoon.com
https://paycrypt.ml - Exchange PayPal to LTC with only 5% Fee
https://auto.creavite.co - Make free banners, pfp etc
https://fixedfloat.com/ - Exchange...
How to use Brutex in Termux?
BruteX is one of the most famous bruteforce tools. You need to follow some commands to download BruteX in Termux .
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/MrHacker-X/BruteX.git/
$ cd BruteX
$ chmod +x *
$ bash...
TO BE USED FOR EDUCATIONAL PURPOSES ONLY
The use of the HiddenEye & its resources/phishing-pages is COMPLETE RESPONSIBILITY of the END-USER .
Hidden content
Nightmare
Thread
cybersecurity
hacking software
hiddeneye
information security
phishing tool
social engineering
Came across this good GitHub repository, that index's a collection of helpful information for getting started with Cobaltstrike.
https://github.com/zer0yu/Awesome-CobaltStrike
0x00 Introduction
0x01 Articles & Videos
1. Basic Knowledge
2. Crack and Customisation
3. Useful Trick
4...
Nightmare
Thread
cybersecurity
ethical hacking
network security
penetration testing
social engineering
installation
simply tap below or visit LinuxnDroid and transform your Android device into a Linux powerhouse effortlessly! 🚀💻📱
🌟 Key Features:
Powerful Tools: Unleash penetration testing tools for a comprehensive security testing experience.
Mobile Optimization: Tailored specifically for...
matthews.rampart@gmail.com:weriswermatt | Plan = Little TunnelBear | Bandwith = 2048
letanthinh1995@gmail.com:Asdf1234 | Plan = Little TunnelBear | Bandwith = 2048
other673@gmail.com:snlrocks | Plan = Little TunnelBear | Bandwith = 2048
️ COMPLETE HACKING COURSE
Ethical Hacking Complete Course
What will you learn in this course :
Important Terms Used In Ethical Hacking
Introduction To Footprinting
Get Information From Website Name
How To Collect Information Using E-mail
Information Collection Using Network
Information...
.
.. The attacker may access the victim’s session data whenever the victim watches the video in a new browser tab.
.
First, the attacker generates a malicious HTML file with video and other dangerous code.
. If a match is found, the file is stored under the client’s FileSystem URI.
...
Blind SQL Injection
Starting I will give the credits for this tutorial to SqlDoctor:
Blind SQL injection:
If you dont know about mysql injection turn around and learn it be for you even consider learning this because this is a whole different story.
1. test for vulnerability so you have a...
Hey everyone, I'm looking for a trusted marketplace where i can buy the following items:
Custom USB devices
Security testing tools
RFID cloning and NFC tools
VPN routers and TOR devices
Faraday bags and signal blockers
Anonymous phones and secure smartphones
Preferably a marketplace with good...
Almazik35
Thread
anonymous
cybersecurity
marketplace
privacy-focused phones
rfid
routers
trusted
usb
wifi
️ Modern phishing tool hidden eye
Link : https://github.com/DarkSecDevelopers/HiddenEye
️ complete phishing tool 32 templates + 1 customizable
Link : https://github.com/thelinuxchoice/blackeye
️ social media phishing with shellphish
Link : https://github.com/thelinuxchoice/shellphish...
CYBERSECURITY - Station X - The Complete Cyber Security Course [FULL COURSE]
full course of "Station X - The Complete Cyber Security Course" on udemy
Hidden content
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of...
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of...
Explore PowerShell’s offensive and defensive capabilities to strengthen your organization’s security
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses
Research and...
Master Cybersecurity with SC-100: Your Path to Becoming a Certified Architect!
Book Description
Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide is your definitive resource for mastering the SC-100 exam and advancing your career in cybersecurity. This comprehensive resource covers...
Embark on your bug bounty journey with essential knowledge and practical skills and contribute to a safer digital landscape
Key Features
Get started with preparing to participate in a bug bounty program
Discover your first bug and claim your reward upon successful detection
Go through core...
Are you tired of relying on traditional, reactive cybersecurity methods that always seem one step behind the hackers? Do you want to take your organization’s cyber defense to the next level and proactively prevent, detect, and respond to even the most advanced and persistent threats? Then this...