PoC exploit for 2 flaws in Dahua cameras leaked online
A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to...
A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to...
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.SummarySpoolSploit is a collection of Windows print...
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
Operation GhostShell: Threat actors used ShellClient malware in cyberespionage campaigns aimed at companies in the aerospace and telecommunications sectors. Hackers...
Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data...
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport.Preview front...
The governor of Arizona, Doug Ducey, has announced the launch of a Cyber Command Center to address the thousands of...
VERSION 3.6Code efficiency enhancements and bug fixes for plugins, and improved logging.Significant UI/UX enhancements.Organisation specific settings and configurations, allowing for...
The UK media outlet The Telegraph has leaked 10 TB of subscriber data after failing to properly secure one of...
Boffins devised a new technique, dubbed LANtenna, to exfiltrate data from systems in air-gapped networks using Ethernet cables as a...
pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web...
Apache has addressed two vulnerabilities, one of which is a path traversal and file disclosure flaw in its HTTP server...
An unnamed ransomware gang used a custom Python script to target VMware ESXi and encrypt all the virtual machines hosted...
CARPUNK IS VERY SIMILAR TO CANghost, ONLY THE DEFFERENCE IS, IT COMES WITH OPTIONS TO ENABLE OR DISABLE INTERFACE AND...
Syniverse service provider discloses a security breach, threat actors have had access to its databases since 2016 and gained some...
The dark web marketplace White House Market shuts down its operation, last week its operators announced that they were retiring....
Experts discovered many misconfigured Apache Airflow servers exposed online that were leaking sensitive information from prominent tech firms. Apache Airflow is an...
Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite).Build$ mvn packageUsageä¸æ–‡ä½¿ç”¨è¯´æ˜ŽDownload the precompiled jar...
Users worldwide are experiencing problems while accessing Facebook services, including Instagram and WhatsApp. Users worldwide are not able to access...
Pottawatomie County restored operations that were suspended after a ransomware attack hit its systems on September 17, 2021. Officials at...
Two ransomware operators arrested in Kyiv, Ukraine, that are suspected to have attacked more than 100 companies causing more than...
ChamelGang APT is a new cyberespionage group that focuses on fuel and energy organizations and aviation industry in Russia ChamelGang...
bopscrk (Before Outset PaSsword CRacKing) is a tool to generate smart and powerful wordlists for targeted attacks.Included in BlackArch Linux...