ADSearch – A Tool To Help Query AD Via The LDAP Protocol
A tool written for cobalt-strike's execute-assembly command that allows for more efficent querying of AD. Key FeaturesList all Domain Admins...
A tool written for cobalt-strike's execute-assembly command that allows for more efficent querying of AD. Key FeaturesList all Domain Admins...
The program is designed to obfuscate the shellcode. Currently the tool supports 2 encryption. 1) XOR2) AES The tool accepts...
The group of cyber mercenaries tracked as DeathStalker has been using a new PowerShell backdoor in recent attacks. The cyber...
A group of Iranian hackers gained access to a un unprotected ICS at an Israeli Water Facility and posted a...
VMware addressed CVE-2020-4006 zero-day flaw in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. VMware has finally...
There it is again—that annoying message that pops up when your email client informs you that a file is too...
The MyOffice platform, the Russian equivalent of Microsoft Office 365, is conquering Africa. The Russian software developer has signed deals...
A computer hacker who stole data from Nintendo and was recently caught with the possession of child pornography on...
More than six years have passed since the banking Trojan Emotet was first detected. During this time it has repeatedly...
PYTMIPE (PYthon library for Token Manipulation and Impersonation for Privilege Escalation) is a Python 3 library for manipulating Windows tokens...
enum4linux-ng.py is a rewrite of Mark Lowe's (former Portcullis Labs now Cisco CX Security Labs) enum4linux.pl, a tool for enumerating...
The Islamic hacker Ardit Ferizi, who is serving 20 years for giving his support to Islamic State group has been granted compassionate...
Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android...
The Egregor ransomware operators hit Metro Vancouver’s transportation agency TransLink disrupting services and payment systems. Egregor ransomware operators made the...
Security researchers have uncovered a new technique to inject a software skimmer onto checkout pages, the malware hides in social...
IBM X-Force experts warned of threat actors actively targeting organizations associated with the COVID-19 vaccine cold chain. Researchers from IBM...
Trickbot, the notorious botnet and banking Trojan, has a new trick up its sleeve. According to new research by Eclypsium...
Hello Folks! In this Videobyte we’re talking about Maze ransomware and whether or not its shutting down, and what that...
Researchers have discovered a new MacOS backdoor that steals credentials and confidential information. As cyber threats continue to rise, the...
Lithuania has applied to host the European Cyber Security Competence Center, which is designed to develop technologies and develop protective...
We track the ongoing activities of more than 900 advanced threat actors; you can find our quarterly overviews here, here...
DeathStalker is a threat actor that’s been active since at least 2012, and we exposed most of their past activities...
Aclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths. It takes a...
Blog can be found at https://medium.com/@patelkathan22/beginners-guide-on-how-you-can-use-javascript-in-bugbounty-492f6eb1f9ea?sk=21500dc4288281c7e6ed2315943269e7 Script made for all your javascript recon automation in bugbounty. Just pass subdomain list...