Threats to U.S. Space Systems Multiply Rapidly; a Novel Approach Emerges For Protection
Become a Patron! The increasing vulnerability of U.S. space systems lately has incited its rivals to begin with their development...
Become a Patron! The increasing vulnerability of U.S. space systems lately has incited its rivals to begin with their development...
By malware standards, the banking trojan Qbot is long in the tooth, but it still has some bite, according to...
Last week on Malwarebytes Labs, we looked into nasty search hijackers that worried a lot of Chrome users; a list...
The Enel Group, a power, and sustainability company were hit by EKANS (SNAKE) ransomware on June 7th affecting its internal...
‘Stay at home’ is the new motto for 2020 and it has entailed many changes to our daily lives, most...
Read the license before using any part from this code :)Malicious DLL (Win Reverse Shell) generator for DLL HijackingFeatures:Reverse TCP...
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting. Axiom...
As our economies start to slowly reopen, knowledge-based jobs are still heavily relying on working from home during the COVID-19...
Recently, these counterfeit apps emerged on the internet, which alarmed the local authorities to warn the general public. A cybersecurity...
A script to enumerate web-sites using Google dorks.Usage example: ./FGDS.sh megacorp.oneVersion: 0.035, June 07, 2020Features:Looking for the common admin panelLooking...
A simple script to generate a hidden url for social engineering.Legal disclaimer:Usage of URLCADIZ for attacking targets without prior mutual...
"Using someone else's charging can cause damage to the smartphone and give hackers access to your personal data and important...
Over the last few months, the cyber world witnessed an alarming spike in the number of malicious attacks, it's seen...
The largest internet service provider in Austria was hit by a security breach this week, in the wake of enduring...
Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate limit!)Usage# python3 shodanfy.py <ip> e.g: python3 shodanfy.py 111.111.111.111 python3...
KeyLogger for Linux Systems. FeaturesRuns on GUI systems or CLISending data by email Dependenciescurllibx11-dev (Debian-Based)libX11-devel (RHEL-Based) Compiling# ./configure# make# make...
A malware campaign is abusing the popular machine-learning (ML) framework Kubeflow in order to target Kubernetes clusters with a crypto...
ESET, an antivirus company has discovered that Gameradon has been growing fast by developing new tools that target Microsoft Office...
What is DNS?It is an essential element in the network (online infrastructure) that allows users to watch or access content...
The tool predicts attacker groups from techniques and softwares used. It searches based on the MITRE ATT&CK frameworkHow it works?1-...
Read the license before using any part from this code :)Hiding executable files in PDF documentsLegal disclaimer:Usage of EvilPDF for...
By Ecular Xu and Joseph C. Chen While tracking Earth Empura, also known as POISON CARP/Evil Eye, we identified an...
The Gamaredon threat group has built a post-compromise tool arsenal that includes remote template injectors for Word and Excel documents...
Scammers often craft social engineering schemes around major crises and news events, as demonstrated by the wealth of coronavirus-themed phishing...