‘ShinyHunters’, a Hacker Group Selling Databases of 10 Organization on the Dark Web for $18,000
A group of hackers has put the user databases of 10 companies for sale on the dark web, a part...
A group of hackers has put the user databases of 10 companies for sale on the dark web, a part...
Ever since this year began, the Maze ransomware has been hitting headlines. Recently researchers discovered more samples of Maze in...
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red...
Fully Undetectable Win32 MSFVenom Payload Generator (meterpreter/shell reverse tcp)Author: github.com/thelinuxchoice/catchyouTwitter: twitter.com/linux_choicePlease, don't upload to VirusTotal! Use https://antiscan.meFeatures:Fully Undetectable Win32 MSFVenom...
Welcome back! In Part 1 of the CMMC series, we introduced the Cybersecurity Maturity Model Certification (CMMC) and the concept...
To make matters worse, attackers are also capitalizing on fears and concerns associated with the global pandemic.In early April, Google...
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques...
Exegol is a fully configured kali light base with a few useful additional tools (~50), a few useful resources (scripts...
According to the study of Kaspersky Lab, at the beginning of 2020, the number of attacks on Russians through scam...
Analysts at Red Canary, a cybersecurity firm have discovered a Monero cryptocurrency-mining campaign that exploits a deserialization vulnerability, CVE-2019-18935 in...
GDBFrontend is an easy, flexible and extensionable gui debugger.InstallingDeb Package (Debian / Ubuntu / KDE Neon)You can install GDBFrontend via...
Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell,...
Reportedly, Google was in the news about having removed 49 Chrome extensions from its browser’s store for robbing crypto-wallet credentials....
In what is said to be one of the most creative hacking technique to date, a group of hackers made...
Our colleagues at Checkpoint put together a fine research writeup on some Naikon resources and activity related to “aria-body” that...
An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.Installationgit clone https://github.com/cwolff411/powerobUsagepython3 powerob.py obfuscate originalfile.ps1 obfuscatedfile.ps1Takes...
VPNs are useful for masking your identity when online. Without a VPN, you run the risk of having your data...
Cisco has noted a whopping 34 vulnerabilities across two of its remote access and network inspection devices on May 6,...
MacOS users who think they have protected themselves by downloading a particular two-factor authentication application may have actually infected their...
In early 2019, Singapore’s data privacy regulators proposed that the country’s data privacy law could use two new updates—a data...
The SBU has neutralized 103 cyberattacks on information resources of state authorities since the beginning of the year.According to the...
A French cybersecurity analyst by the pseudonym 'Elliot Alderson' on Twitter claims he could access details of Corona infected people...
The Office of the German Federal Public Prosecutor issued an arrest warrant for a Russian whom they suspect of hacking...
PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of...