Sale of Dharma ransomware source code draws hackers’ scrutiny, but the price is right
An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian...
An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Positive Technologies experts said that the number of network nodes in the Russian Federation accessible via the Remote Desktop Protocol...
If hackers trespass into your smartphones, they can send fake emails, fake alerts using your camera, and even control user...
Windows SMBv3 LPE Exploit AuthorsDaniel García Gutiérrez (@danigargu) Manuel Blanco Parajón (@dialluvioso_) Referenceshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0796 https://www.synacktiv.com/posts/exploit/im-smbghost-daba-dee-daba-da.html https://www.fortinet.com/blog/threat-research/cve-2020-0796-memory-corruption-vulnerability-in-windows-10-smb-server.html#.Xndfn0lv150.twitter https://www.mcafee.com/blogs/other-blogs/mcafee-labs/smbghost-analysis-of-cve-2020-0796/ http://blogs.360.cn/post/CVE-2020-0796.html https://blog.zecops.com/vulnerabilities/vulnerability-reproduction-cve-2020-0796-poc/ Download CVE-2020-0796...
(c) 2020 ZecOps, Inc. - https://www.zecops.com - Find Attackers' Mistakes POC to check for CVE-2020-0796 / "SMBGhost" Expected outcome: Blue...
DisclaimerThis is a PoC exploit for the CVE-2019-15126 kr00k vulnerability.This project is intended for educational purposes only and cannot be...
One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows,...
Now that nearly all Rapid7 employees—along with a huge percentage of U.S.-based knowledge workers—are sliding into a work-from-home (WFH) routine,...
Chinese security firm Qihoo 360 reported that since December 2019, a miscreants group has been hacking into DrayTek enterprise routers...
Check Point experts have identified a new family of malware in the Google Play Store. It was installed in 56...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the...
SauronEye is a search tool built to aid red teams in finding files containing specific keywords.Features:Search multiple (network) drivesSearch contents...
The spread of malware through apps being downloaded by users in the name of 'the latest information and instructions about...
Russian Security Services (RSB) has tracked down and charged an international credit card fraud ring arresting 25 accused. The carding...
Tool Information Gathering Write With Python.PreView ██╗ ██╗███████╗██████╗ ██╗ ██╗██╗██╗ ██╗ ███████╗██████╗ ██║ ██║██╔════╝██╔══██╗██║ ██╔╝██║██║ ██║ ██╔════╝██╔══██╗ ██║ █╗ ██║█████╗...
A security testing tool to facilitate GraphQL technology security auditing efforts.InQL can be used as a stand-alone script, or as...
Everyone wants to receive a free $50 Best Buy gift card and USB drive in the mail, but as the...
The Federal Bureau of Investigation as of late brought down the Russian-based online platform DEER.IO that said to have been...
Atlas VPN did a new study based on Flash Intelligence Research findings from 2017-2019. The research has revealed the costs...
Defense Minister Sergei Shoigu, speaking in the Federation Council, announced opposition attempts to penetrate Russian military facilities.The head of the...
Note #1: if using a non-direct connection (e.g. proxies in between), the -no-check-src-port flag is needed, so the server only...
Stealth post-exploitation framework for Wordpress CMSOfficial ProjectOpal Repository.What is it and why was it made?We intentionally made it for our...
In the last week, we’ve seen multiple coronavirus scams pushed by bad actors, including RAT attacks via fake health advisories,...