Autovpn – Create On Demand Disposable OpenVPN Endpoints On AWS
Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done...
Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done...
Create a VPS on Google Cloud Platform or Digital Ocean easily with the docker for pentest included to launch the...
hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle...
wordlist_generator generates wordlists with unique words with techniques mentioned in tomnomnom's report "Who, What, Where, When". It takes URLs from...
 There are better ways than managing vulnerabilities with spreadsheets, especially when you are working with several tools. We know it’s...
In August, Malwarebytes Labs analyzed the damage caused by COVID-19 to business cybersecurity. Because of immediate, mandated transitions to working...
The Social Messaging app WhatsApp has been open about its bugs and vulnerabilities recently. To be vocal about the issue,...
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around...
h4rpy is an automated WPA/WPA2 PSK attack tool, wrapper of aircrack-ng framework.h4rpy provides clean interface for automated cracking of WPA/WPA2...
SNIcat is a proof of concept tool that performs data exfiltration, utilizing a covert channel method via. Server Name Indication,...
Posted by Pramod Rana on Sep 04It is no secret that today we have more vulnerabilities than we can assess...
Posted by Red Timmy Security on Sep 04Hi, we have just released an exploit for CVE-2020-13162. This vulnerability affects the...
Posted by Pietro Oliva via Fulldisclosure on Sep 04Vulnerability title: Noise-Java ChaChaPolyCipherState.encryptWithAd() insufficient boundary checks Author: Pietro Oliva CVE: CVE-2020-25021...
Posted by Pietro Oliva via Fulldisclosure on Sep 04Vulnerability title: Noise-Java AESGCMOnCtrCipherState.encryptWithAd() insufficient boundary checks Author: Pietro Oliva CVE: CVE-2020-25023...
Posted by Pietro Oliva via Fulldisclosure on Sep 04Vulnerability title: Noise-Java AESGCMFallbackCipherState.encryptWithAd() insufficient boundary checks Author: Pietro Oliva CVE: CVE-2020-25022...
PCI DSS is short for Payment Card Industry Data Security Standard. Every party involved in accepting credit card payments is...
Associate Professor of computer science at the Russian University of Economics, Alexander Timofeev said that hackers can use Bluetooth to...
Stortinget, the Norwegian Parliament succumbed to a cyber-attack that targeted its internal email system. The news came in on Tuesday...
Emotet malware has been continually evolving to the levels of technically sophisticated malware that has a major role in the...
IT threat evolution Q2 2020. ReviewIT threat evolution Q2 2020. PC statistics These statistics are based on detection verdicts of...
IT threat evolution Q2 2020. ReviewIT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of...
IT threat evolution Q2 2020. PC statisticsIT threat evolution Q2 2020. Mobile statistics Targeted attacks PhantomLance: hiding in plain sight...
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.SetupThis tool is compactible...
Bug Bounty Recon (bbrecon) is a free Recon-as-a-Service for bug bounty hunters and security researchers. The API aims to provide...