Crawpy – Yet Another Content Discovery Tool
Yet another An example run with auto calibration and recursive mode enabled Example reports Example reports can be found here...
Yet another An example run with auto calibration and recursive mode enabled Example reports Example reports can be found here...
Russia’s internet watchdog, ‘Roskomnadzor’, has announced the ban of other VPN products, 15 VPN services are now illegal in Russia...
Threat actors are targeting e-stores with remote access malware, dubbed NginRAT, that hides on Nginx servers bypassing security solutions. Researchers...
Kerberos attack toolkit -pure python- Install pip3 install kerberoast Prereqirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted...
Europol identified 18,351 money mules and arrested 1,803 of them as part of an international anti-money-laundering operation codenamed EMMA 7....
Mozilla fixed a critical memory corruption issue affecting its cross-platform Network Security Services (NSS) set of cryptography libraries. Mozilla has...
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain...
VirusTotal announced VirusTotal Collections, a new service that allows security researchers to share sets of Indicators of Compromise (IoCs). VirusTotal...
Nation-state actors from China, India, and Russia, were spotted using a novel RTF template injection technique in recent attacks. APT...
Netcat like reverse shell for Linux & Windows. Features WindowsUsage:└ Shared Commands: !exit !upload <src> <dst> * uploads a file...
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The...
Sabbath ransomware is a new threat that has been targeting critical infrastructure in the United States and Canada since June...
Opera released a mini patch for a vulnerability in their turbo servers that dates back to 2018. Prior approval are...
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then...
360 Netlab experts spotted a new botnet dubbed EwDoor that infects unpatched AT&T enterprise network edge devices. Experts from Qihoo 360’s...
Researchers discovered a critical wormable buffer overflow vulnerability that affects 150 different HP multifunction printer models (MFPs). Cybersecurity researchers from...
A threat actor named WIRTE targets government, diplomatic entities, military organizations, law firms, and financial institutions in Middle East. Cybersecurity...
Kit Hunter: A basic phishing kit detection tool Version 2.6.0 28 September 2021 Testing and development took place on Python...
Experts found four Android banking trojans that were available on the official Google Play Store and that infected +300,000 devices....
Google Project Zero researchers have discovered two vulnerabilities in the video conferencing software Zoom that expose users to attacks. Security...
Panasonic disclosed a security breach after threat actors gained access to its servers storing potentially sensitive information. Japanese electronics giant...
Features of Repository =================== Hands-on Download Digital-Forensics-Lab If you like the site, please consider joining the telegram channel or supporting...
Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat...
Biopharmaceutical company Supernus Pharmaceuticals discloses a ransomware attack, the Hive ransomware claims to have stolen company data. Biopharmaceutical company Supernus...