New Network Protocols Abused To Launch Large-Scale Distributed Denial of Service (DDoS) Attacks
The Federal Bureau of Investigation issued an alert just the previous week cautioning about the discovery of new network protocols...
The Federal Bureau of Investigation issued an alert just the previous week cautioning about the discovery of new network protocols...
An unknown Botnet called "Prometei" is attacking windows and Microsoft devices (vulnerable) using brute force SMb exploits. According to Cisco...
We may only be six months in, but there’s little doubt that 2020 will go down in history as a...
A polyglot payload generator IntroductionSNOWCRASH creates a script that can be launched on both Linux and Windows machines. Payload selected...
Perform automated network reconnaissance scans to gather network intelligence.IntelSpy is a multi-threaded network intelligence spy tool which performs automated enumeration...
"I've built plugins for four SOAR vendors, and your model was the most mature. You had the best code quality...
Last week on Malwarebytes Labs, our Lock and Code podcast delved into Bluetooth and beacon technology. We also dug into...
A bug in Mozilla Firefox enabled websites to keep the smartphone camera active even after leaving the browser or locking...
An anonymous vigilante hacker has been actively involved in obstructing 2019's most widespread cybercrime operation, Emotet that made a comeback...
Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windowsBlogpost: https://redteamer.tips/?p=108To be used with a cmd that does whatever the F you want, for a...
Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)This script use "WafW00f" to detect the...
Modern environments today are, well, complex. They often include a concoction of on-premises, cloud, container, and virtualization services. There’s a...
By Aliakbar Zahravi Ensiko is a PHP web shell with ransomware capabilities that targets various platforms such as Linux, Windows,...
Two Hacking groups from China named Gothic Panda and Stone Panda have been identified for organizing the majority of the...
Search Google, Bing, Yahoo or Yandex for a search term with different websites. A default list is already provided, which...
reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan...
Six files with tables in CSV format are in the public domain, which means that anyone can download them. Each...
Aberystwyth University, a 148-year-old mid-Wales institution was attacked via a hack on Blackbaud, a US company that deals with education...
Autoenum is a recon tool which performs automatic enumeration of services discovered. I built this to save some time during...
AuthMatrix is an extension to Burp Suite that provides a simple way to test authorization in web applications and web...
Hyderabad witnessed three back to back cases of cyberfraud wherein criminals targeted Airtel customers promising them eSIM connection that led...
Kaspersky Lab revealed that the well-known North Korean hacker group Lazarus has become active in Russia. The attackers attack through...
Welcome to the Permission Manager!Permission Manager is an application developed by SIGHUP that enables a super-easy and user-friendly RBAC management...
Quiver is the tool to manage all of your tools. It's an opinionated and curated collection of commands, notes and...