WMIHACKER – A Bypass Anti-virus Software Lateral Movement Command Execution Tool
中文版(Chinese version)Disclaimer: The technology involved in this project is only for security learning and defense purposes, illegal use is prohibited!Bypass...
中文版(Chinese version)Disclaimer: The technology involved in this project is only for security learning and defense purposes, illegal use is prohibited!Bypass...
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and antivirus solutions. It digests malicious...
Earlier today, security firm Secura published a technical paper on CVE-2020-1472, a CVSS-10 privilege escalation vulnerability in Microsoft’s Netlogon authentication...
Vulnerability management programs look different depending on the available resources and specific risks your organization faces. While both identifying and...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
Microsoft Office 365 will now let users view their phishing messages that are automatically screened by Exchange Online Protection (EOP)...
DockerENT is activE ruNtime application security scanning Tool (RAST tool) and framework which is pluggable and written in python. It...
HTTP-revshell is a tool focused on redteam exercises and pentesters. This tool provides a reverse connection through the http/s protocol....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Gaming hardware manufacturer Razer suffered a data leak, an unsecured database managed by the company containing gamers’ info was exposed...
The Development Bank of Seychelles (DBS) was hit by a ransomware attack disclose the Central Bank of Seychelles (CBS). The Central...
The INVDoS (Bitcoin Inventory Out-of-Memory Denial-of-Service)Attack would have allowed hackers to crash Bitcoin nodes and alternative chains. Two years ago,...
A cybercrime group named Malàsmoke has been targeting porn sites over the past months with malicious ads redirecting users to...
Experts reported threat actors are increasingly targeting a recently addressed vulnerability in the WordPress plugin File Manager. Researchers from WordPress...
The creation of the Russian cloud services will allow protecting confidential data of not only ministries or departments, but also...
Two teams of security researchers have discovered a new vulnerability in Bluetooth technology that has been confirmed by The Bluetooth...
Generating a tremendous revenue of $120.1 billion in 2019, the gaming industry is one of the largest and fastest-growing sectors....
Some-ToolsWhyI was looking for a way to manage and keep up to date some tools that are not include in...
Multiple target ZAP Scanning / mzap is a tool for scanning N*N in ZAP.ConceptInstallationgo-get$ go get -u github.com/hahwul/mzapsnapcraft$ sudo snap...
Singapore held its most recent general election on July 10 2020, and although they used the electoral system called first-past-the-post...
The Antidrone system will allow detecting drones that fly up to any object, said Eugene Kaspersky, CEO of the Kaspersky...
Microsoft reports breaching of email accounts belonging to individuals associated with the Biden and Trump election campaigns by Chinese, Iranian,...
Posted by hyp3rlinx on Sep 11 Title: Windows TCPIP Finger Command - C2 Channel and Bypassing Security Software Credits: John...
A fast HTTP enumerator that allows you to execute a large number of HTTP requests, filter the responses and display...