Gothic Panda and Stone Panda: Chinese Hackers that Launched Mass Cyber Attacks on Indian Companies
Two Hacking groups from China named Gothic Panda and Stone Panda have been identified for organizing the majority of the...
Two Hacking groups from China named Gothic Panda and Stone Panda have been identified for organizing the majority of the...
Search Google, Bing, Yahoo or Yandex for a search term with different websites. A default list is already provided, which...
reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan...
Six files with tables in CSV format are in the public domain, which means that anyone can download them. Each...
Aberystwyth University, a 148-year-old mid-Wales institution was attacked via a hack on Blackbaud, a US company that deals with education...
Autoenum is a recon tool which performs automatic enumeration of services discovered. I built this to save some time during...
AuthMatrix is an extension to Burp Suite that provides a simple way to test authorization in web applications and web...
Hyderabad witnessed three back to back cases of cyberfraud wherein criminals targeted Airtel customers promising them eSIM connection that led...
Kaspersky Lab revealed that the well-known North Korean hacker group Lazarus has become active in Russia. The attackers attack through...
Welcome to the Permission Manager!Permission Manager is an application developed by SIGHUP that enables a super-easy and user-friendly RBAC management...
Quiver is the tool to manage all of your tools. It's an opinionated and curated collection of commands, notes and...
Subversive deepfakes that enter the party unannounced, do their thing, then slink off into the night without anybody noticing are...
The discovery of a brand new malware framework and its linkages with a North Korean hacker group has heightened the...
In a recent cybersecurity breach incident, Twilio acknowledges that hackers breached into the company's cloud services (unsecured) and compromised its...
"onex a hacking tools library." Onex is a kali linux hacking tools installer for termux and other linux distribution. It's...
A graphical interface to use information security tools by the browser. Getting StartedKali Linux Tools Interface is a graphical interface...
On July 22, Cisco released a patch for a high-severity read-only patch traversal vulnerability in its Cisco Adaptive Security Appliance...
We’ve continued to make enhancements around our Custom Parsing Tool. Most recently, we’ve made it easier for customers to define...
The Dacls remote access trojan that is capable of attacking Windows, Linux and macOS environments has been used to distribute...
Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security...
"To prevent hackers from getting personal data of users, users don't need to use a VPN connection in their daily...
Chinese video-sharing social networking platform, TikTok is undergoing scrutinization in Australia over data security and privacy concerns, according to the...
As the IT and OT environment becomes more complex, adversaries are quick to adapt their attack strategy. For example, as...
Lazybee tool is a python based script from which you can generate random wordlist for brutefocre attacks. This tool has...